Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

News & Commentary
FBI's IC3 Logs 1M Complaints in 14 Months
Dark Reading Staff, Quick Hits
The FBI's IC3 reports COVID-related scams and an increase in online retail may be behind the upswing in complaints.
By Dark Reading Staff , 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Why Anti-Phishing Training Isn't Enough
Aviv Grafi, CEO & Founder, VotiroCommentary
Not only is relying on employees' awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems.
By Aviv Grafi CEO & Founder, Votiro, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
How to Mitigate Against Domain Credential Theft
Zur Ulianitzky & Yaron Shani, Head of Security Research , XM Cyber / Senior Cybersecurity Researcher, XM CyberCommentary
Attackers routinely reuse stolen domain credentials. Here are some ways to thwart their access.
By Zur Ulianitzky & Yaron Shani Head of Security Research , XM Cyber / Senior Cybersecurity Researcher, XM Cyber, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Cisco Plans to Create 'Premium' SecureX Offering With Kenna Security Features
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Executives from Cisco share insights on the networking giant's ambitious security strategy.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Latest Security News From RSAC 2021
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2021.
By Dark Reading Staff , 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
DarkSide Ransomware Variant Targets Disk Partitions
Dark Reading Staff, Quick Hits
A newly discovered DarkSide ransomware variant can detect and compromise partitioned hard drives, researchers report.
By Dark Reading Staff , 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
47% of Criminals Buying Exploits Target Microsoft Products
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers examine English- and Russian-language underground exploits to track how exploits are advertised and sold.
By Kelly Sheridan Staff Editor, Dark Reading, 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
DDoS Attacks Up 31% in Q1 2021: Report
Dark Reading Staff, Quick Hits
If pace continues, DDoS attack activity could surpass last year's 10-million attack threshold.
By Dark Reading Staff , 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
Agility Broke AppSec. Now It's Going to Fix It.
Chen Gour-Arie, Chief Architect, Enso SecurityCommentary
Outnumbered 100 to 1 by developers, AppSec needs a new model of agility to catch up and protect everything that needs to be secured.
By Chen Gour-Arie Chief Architect, Enso Security, 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Road Trip
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 5/17/2021
Comment2 comments  |  Read  |  Post a Comment
Rapid7 Source Code Accessed in Supply Chain Attack
Dark Reading Staff, Quick Hits
An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data.
By Dark Reading Staff , 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Cisco Confirms Plans to Acquire Kenna Security
Dark Reading Staff, Quick Hits
Cisco plans to integrate Kenna's vulnerability management technology into its SecureX platform.
By Dark Reading Staff , 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
SOC Teams Burdened by Alert Fatigue Explore XDR
Joan Goodchild, Staff EditorQuick Hits
ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately
By Joan Goodchild Staff Editor, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Wi-Fi Design, Implementation Flaws Allow a Range of Frag Attacks
Robert Lemos, Contributing WriterNews
Every Wi-Fi product is affected by at least one fragmentation and aggregation vulnerability, which could lead to a machine-in-the-middle attack, researcher says.
By Robert Lemos Contributing Writer, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Security Trends to Follow at RSA Conference 2021
Yonit Wiseman, Associate at YL VenturesCommentary
Here are three key categories of sessions that provide an inside look at some of today's most interesting cybersecurity trends.
By Yonit Wiseman Associate at YL Ventures, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Firms Struggle to Secure Multicloud Misconfigurations
Robert Lemos, Contributing WriterNews
Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database.
By Robert Lemos Contributing Writer, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Dragos & IronNet Partner on Critical Infrastructure Security
Dark Reading Staff, Quick Hits
The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
By Dark Reading Staff , 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
When AI Becomes the Hacker
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Adapting to the Security Threat of Climate Change
Lewis Huynh, Chief Security Officer, NinjaRMCommentary
Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
By Lewis Huynh Chief Security Officer, NinjaRM, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Defending the Castle: How World History Can Teach Cybersecurity a Lesson
Rob Gurzeev, CEO and Co-Founder of CyCognitoCommentary
Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended.
By Rob Gurzeev CEO and Co-Founder of CyCognito, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by raenye
Current Conversations "Network congestion ahead."
In reply to: entry
Post Your Own Reply
More Conversations
PR Newswire
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3200
PUBLISHED: 2021-05-18
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
CVE-2021-32305
PUBLISHED: 2021-05-18
WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
CVE-2020-20951
PUBLISHED: 2021-05-18
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
CVE-2020-23861
PUBLISHED: 2021-05-18
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
CVE-2020-24740
PUBLISHED: 2021-05-18
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage