Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

News & Commentary
Attackers Find New Way to Exploit Google Docs for Phishing
Jai Vijayan, Contributing WriterNews
Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content.
By Jai Vijayan Contributing Writer, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
This Week in Database Leaks: Cognyte, CVS, Wegmans
Kelly Sheridan, Staff Editor, Dark ReadingNews
Billions of records were found exposed this week due to unprotected databases owned by major corporations and third-party providers.
By Kelly Sheridan Staff Editor, Dark Reading, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Accidental Insider Leaks Prove Major Source of Risk
Dark Reading Staff, Quick Hits
Research reports highlight growing concerns around insider negligence that leads to data breaches.
By Dark Reading Staff , 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
4 Habits of Highly Effective Security Operators
Ricardo Villadiego, Founder and CEO of LumuCommentary
These good habits can make all the difference in advancing careers for cybersecurity operators who spend their days putting out fires large and small.
By Ricardo Villadiego Founder and CEO of Lumu, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Carnival Cruise Line Reports Security Breach
Dark Reading Staff, Quick Hits
The cruise ship operator says the incident affected employee and guest data.
By Dark Reading Staff , 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of TessianCommentary
Consider four factors and behaviors that impact a particular employee's risk, and how security training should take them into account.
By Tim Sadler CEO and co-founder of Tessian, 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Mission Critical: What Really Matters in a Cybersecurity Incident
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLCCommentary
The things you do before and during a cybersecurity incident can make or break the success of your response.
By Beth Burgin Waller Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC, 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Ransomware Operators' Strategies Evolve as Attacks Rise
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks.
By Kelly Sheridan Staff Editor, Dark Reading, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking
Dark Reading Staff, Quick Hits
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Security Flaw Discovered In Peloton Equipment
Dark Reading Staff, Quick Hits
The vulnerability could give attackers remote root access to the bike's tablet, researchers report.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Cars, Medicine, Electric Grids: Future Hackers Will Hit Much More Than Networks in an IT/OT Integrated World
Greg Valentine, Senior Cybersecurity Director, Capgemini North AmericaCommentary
Intelligent systems must include the right cybersecurity protections to prevent physical threats to operational technology.
By Greg Valentine Senior Cybersecurity Director, Capgemini North America, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Russian National Convicted on Charges Related to Kelihos Botnet
Dark Reading Staff, Quick Hits
Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Don't Get Stymied by Security Indecision
Alex Pezold, Founder & Chief Executive Officer, TokenExCommentary
You might be increasing cyber-risk by not actively working to reduce it.
By Alex Pezold Founder & Chief Executive Officer, TokenEx, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet
Jai Vijayan, Contributing WriterNews
Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.
By Jai Vijayan Contributing Writer, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Security Experts Scrutinize Apple, Amazon IoT Networks
Robert Lemos, Contributing WriterNews
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.
By Robert Lemos Contributing Writer, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Andariel Group Targets South Korean Entities in New Campaign
Dark Reading Staff, Quick Hits
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.
By Dark Reading Staff , 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Chen Fradkin, Security Researcher at ClarotyCommentary
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
By Chen Fradkin Security Researcher at Claroty, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
How Does the Government Buy Its Cybersecurity?
Josh Ladick, President of GSA Focus, Inc.Commentary
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
By Josh Ladick President of GSA Focus, Inc., 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24368
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.