Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

News & Commentary
Cisco Plans to Create 'Premium' SecureX Offering With Kenna Security Features
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Executives from Cisco share insights on the networking giant's ambitious security strategy.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
DDoS Attacks Up 31% in Q1 2021: Report
Dark Reading Staff, Quick Hits
If pace continues, DDoS attack activity could surpass last year's 10-million attack threshold.
By Dark Reading Staff , 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Road Trip
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 5/17/2021
Comment2 comments  |  Read  |  Post a Comment
SOC Teams Burdened by Alert Fatigue Explore XDR
Joan Goodchild, Staff EditorQuick Hits
ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately
By Joan Goodchild Staff Editor, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Wi-Fi Design, Implementation Flaws Allow a Range of Frag Attacks
Robert Lemos, Contributing WriterNews
Every Wi-Fi product is affected by at least one fragmentation and aggregation vulnerability, which could lead to a machine-in-the-middle attack, researcher says.
By Robert Lemos Contributing Writer, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Firms Struggle to Secure Multicloud Misconfigurations
Robert Lemos, Contributing WriterNews
Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database.
By Robert Lemos Contributing Writer, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Dragos & IronNet Partner on Critical Infrastructure Security
Dark Reading Staff, Quick Hits
The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
By Dark Reading Staff , 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
When AI Becomes the Hacker
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Adapting to the Security Threat of Climate Change
Lewis Huynh, Chief Security Officer, NinjaRMCommentary
Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
By Lewis Huynh Chief Security Officer, NinjaRM, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
66% of CISOs Feel Unprepared for Cyberattacks
Dark Reading Staff, Quick Hits
More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.
By Dark Reading Staff , 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Vulnerable Protocols Leave Firms Open to Further Compromises
Robert Lemos, Contributing WriterNews
Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.
By Robert Lemos Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker
Keira Stevens, Manager of Human intelligence, SpyCloudCommentary
Understanding a few basics about how password crackers think and behave could help you keep your users safer.
By Keira Stevens Manager of Human intelligence, SpyCloud, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Why You Should Be Prepared to Pay a Ransom
Christopher Muffat, CEO and founderCommentary
Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.
By Christopher Muffat CEO and founder, 5/12/2021
Comment1 Comment  |  Read  |  Post a Comment
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/2021
Comment1 Comment  |  Read  |  Post a Comment
Adobe Issues Patch for Acrobat Zero-Day
Dark Reading Staff, Quick Hits
The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.
By Dark Reading Staff , 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Cartoon Caption Winner: Greetings, Earthlings
John Klossner, CartoonistCommentary
And the winner of Dark Reading's April cartoon caption contest is ...
By John Klossner Cartoonist, 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato NetworksCommentary
Deeply rooted cybersecurity misconceptions are poisoning our ability to understand and defend against attacks.
By Etay Maor Sr. Director Security Strategy at Cato Networks, 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Tulsa Deals With Aftermath of Ransomware Attack
Dark Reading Staff, Quick Hits
Weekend attack shuts down several city sites and service.
By Dark Reading Staff , 5/10/2021
Comment0 comments  |  Read  |  Post a Comment
Most Organizations Feel More Vulnerable to Breaches Amid Pandemic
Dark Reading Staff, Quick Hits
More than half of business see the need for significant long-term changes to IT due to COVID-19, research finds.
By Dark Reading Staff , 5/7/2021
Comment0 comments  |  Read  |  Post a Comment
Black Hat Asia Speakers Share Secrets About Sandboxes, Smart Doors, and Security
Dark Reading Staff,
Find video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.
By Dark Reading Staff , 5/7/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by raenye
Current Conversations "Network congestion ahead."
In reply to: entry
Post Your Own Reply
More Conversations
PR Newswire
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22117
PUBLISHED: 2021-05-18
RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.
CVE-2021-3518
PUBLISHED: 2021-05-18
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
CVE-2021-3531
PUBLISHED: 2021-05-18
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
CVE-2002-2438
PUBLISHED: 2021-05-18
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
CVE-2020-25709
PUBLISHED: 2021-05-18
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.