Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

News & Commentary
Details Emerge on How Gaming Giant EA Was Hacked
Dark Reading Staff, Quick Hits
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
JBS CEO Says Company Paid $11M in Ransom
Dark Reading Staff, Quick Hits
The decision to pay attackers was a difficult one, CEO Andre Nogueira said in a statement.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
The Workforce Shortage in Cybersecurity Is a Myth
Michael Roytman, Chief Data Scientist, Kenna SecurityCommentary
What we really have is an automation-in-the-wrong-place problem.
By Michael Roytman Chief Data Scientist, Kenna Security, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Required MFA Is Not Sufficient for Strong Security: Report
Robert Lemos, Contributing WriterNews
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.
By Robert Lemos Contributing Writer, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
RSA Spins Off Fraud & Risk Intelligence Unit
Kelly Sheridan, Staff Editor, Dark ReadingNews
The new company, called Outseer, will continue to focus on payment authentication and fraud detection and analysis.
By Kelly Sheridan Staff Editor, Dark Reading, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
With Cloud, CDO and CISO Concerns Are Equally Important
Ameesh Divatia, Co-Founder & CEO of BaffleCommentary
Navigated properly, a melding of these complementary perspectives can help keep an organization more secure.
By Ameesh Divatia Co-Founder & CEO of Baffle, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game DesignerCommentary
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
By Adam Shostack Consultant, Entrepreneur, Technologist, Game Designer, 6/9/2021
Comment1 Comment  |  Read  |  Post a Comment
FBI Issued Encrypted Devices to Capture Criminals
Dark Reading Staff, Quick Hits
A sting operation delivered devices into the hands of global criminals and used the intelligence gathered to stop drug crimes.
By Dark Reading Staff , 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
An Answer to APP Scams You Can Bank On
Amelia Ahlgren, EVP, Strategy and Operations, BioCatchCommentary
Financial institutions' usual fraud-detection methods can't detect most authorized push payment (APP) scams, putting customers and banks at risk.
By Amelia Ahlgren EVP, Strategy and Operations, BioCatch, 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
Latvian Woman Charged for Role In Crafting Trickbot Malware
Dark Reading Staff, Quick Hits
Alla Witte and her associates are accused of using Trickbot to infect tens of millions of computers around the world, the Justice Department reports.
By Dark Reading Staff , 6/7/2021
Comment0 comments  |  Read  |  Post a Comment
Cartoon Caption Winner: Road Trip
John Klossner, CartoonistCommentary
And the winner of Dark Reading's cartoon caption contest is ...
By John Klossner Cartoonist, 6/7/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Athletes Compete to Form US Cyber Team
Jessica Gulick, US Cyber Games CommissionerCommentary
Here's how security pros can showcase value to future employers: a field of friendly strife to measure their aptitude against competitors.
By Jessica Gulick US Cyber Games Commissioner, 6/7/2021
Comment0 comments  |  Read  |  Post a Comment
NortonLifeLock Criticized for New Cryptomining Feature
Robert Lemos, Contributing WriterNews
While the crypto crowd applauds the move, critics worry about the environmental impact, supporting a currency used for ransomware, and mining further slowing down systems.
By Robert Lemos Contributing Writer, 6/7/2021
Comment0 comments  |  Read  |  Post a Comment
The US Must Redefine Critical Infrastructure for the Digital Era
Caleb Barlow, CEO and President, CynergisTekCommentary
The template being used to manage essential connectivity isn't just outdated, it's actively counter-productive.
By Caleb Barlow CEO and President, CynergisTek, 6/7/2021
Comment0 comments  |  Read  |  Post a Comment
Organizations Shift Further Left in App Development
Dark Reading Staff, Quick Hits
Most IT and security professionals surveyed think security is a critical enough reason to pause app development.
By Dark Reading Staff , 6/4/2021
Comment0 comments  |  Read  |  Post a Comment
Data Breaches Drive Higher Loan Interest Rates
Robert Lemos, Contributing WriterNews
Businesses that suffer a security breach may not see their stock price tumble, but they may pay higher rates for loans and be forced to provide collateral, researchers report.
By Robert Lemos Contributing Writer, 6/4/2021
Comment0 comments  |  Read  |  Post a Comment
Google Experts Explore Open Source Security Challenges & Fixes
Kelly Sheridan, Staff Editor, Dark ReadingNews
An open source security event brought discussions of supply chain security and managing flaws in open source projects.
By Kelly Sheridan Staff Editor, Dark Reading, 6/3/2021
Comment0 comments  |  Read  |  Post a Comment
NY & Mass. Transportation Providers Targeted in Recent Attacks
Dark Reading Staff, Quick Hits
New York's Metropolitan Transportation Authority and the Steamship Authority of Massachusetts were both victims of cyberattacks.
By Dark Reading Staff , 6/3/2021
Comment0 comments  |  Read  |  Post a Comment
The Colonial Pipeline Attack Is Your Boardroom Wake-Up Call
Dan Verton, Director, ThreatConnectCommentary
Why business leaders must adopt a risk-led approach to cybersecurity.
By Dan Verton Director, ThreatConnect, 6/3/2021
Comment1 Comment  |  Read  |  Post a Comment
Encryption Helps Companies Avoid Breach Notifications
Robert Lemos, Contributing WriterNews
With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds.
By Robert Lemos Contributing Writer, 6/2/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by vderrill
Current Conversations Zoom Zoom!
In reply to: sorry about this
Post Your Own Reply
More Conversations
PR Newswire
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.