Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Advertise With Us

Connect With The Cybersecurity Community

Dark Reading is a trusted resource for cybersecurity decision-makers in charge of providing broad access to data that improves business operations and protecting business data from theft or compromise. In an environment where online exploits evolve and change every minute, Dark Reading is where cybersecurity editors, vulnerability researchers, security practitioners, consultants, and technology come to work together across industries and geographies to build better defenses.

Dark Reading provides:

  • Daily news about the cybersecurity industry i.e. potential threats, the scope and nature of those threats, and the tools and practices for preventing them
  • Original features and technical articles written by industry thought leaders
  • Targeted content sections: Analytics, Attacks/Breaches, Application Security, Cloud Security, Endpoint, IoT, Operations, Perimeter, Physical Security, Risk, Threat Intelligence, and Vulnerabilities/Threats

Key site stats:

Advertising Contact: [email protected]

Advertising Opportunities

Not every business has the same marketing goals, which is why Dark Reading has an array of media tools and custom services for marketers to build a program to suit their needs. Download the 2021 Media Kit.

Branding & Awareness

  • Ad Targeting
  • Banner Ads
  • eNewsletters
  • InRead Video

Lead Generation

  • Research Reports
  • Top Trends Reports
  • Topic Alignment Program (TAP)
  • Virtual Events
  • Webinars

Native Advertising

  • Native Content Distribution Ad Unit
  • Partner Perspectives
  • Sponsored Article

For more details on our audience and marketing solutions, download the 2021 Media Kit.

Click here to request advertising information.

News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21981
PUBLISHED: 2021-04-19
VMware NSX-T contains a privilege escalation vulnerability due to an issue with RBAC (Role based access control) role assignment. Successful exploitation of this issue may allow attackers with local guest user account to assign privileges higher than their own permission level.
CVE-2021-20989
PUBLISHED: 2021-04-19
Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be us...
CVE-2021-20990
PUBLISHED: 2021-04-19
In Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older an internal management service is accessible on port 8000 and some API endpoints could be accessed without authentication to trigger a shutdown, a reboot or a reboot into recovery mode.
CVE-2021-20991
PUBLISHED: 2021-04-19
In Fibaro Home Center 2 and Lite devices with firmware version 4.540 and older an authenticated user can run commands as root user using a command injection vulnerability.
CVE-2021-20992
PUBLISHED: 2021-04-19
In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.