Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Authentication
Page 1 / 2   >   >>
Transmit Security Announces $543M Series A Funding Round
Quick Hits  |  6/22/2021  | 
The passwordless technology provider says the funding will be used to increase its reach and expand primary business functions.
Did Companies Fail to Disclose Being Affected by SolarWinds Breach?
News  |  6/21/2021  | 
The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says.
Google Workspace Adds Client-Side Encryption
Quick Hits  |  6/14/2021  | 
Users given control over encryption keys, Google says.
Secure Access Trade-offs for DevSecOps Teams
Commentary  |  6/11/2021  | 
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
Colonial Pipeline CEO: Ransomware Attack Started via Pilfered 'Legacy' VPN Account
Quick Hits  |  6/8/2021  | 
No multifactor authentication was attached to the stolen VPN password used by the attackers, Colonial Pipeline president & CEO Joseph Blount told a Senate committee today.
'Have I Been Pwned' Code Base Now Open Source
Quick Hits  |  5/27/2021  | 
Founder Troy Hunt also announces the platform will receive compromised passwords the FBI finds in its investigations.
Axis Fosters Work-From-Home Momentum with Zero Trust Network Access
Commentary  |  5/25/2021  | 
SPONSORED: Watch now -- VPN and VDI, while still useful, lack the hardened security required to keep users secure. That's created an opening for Zero Trust network access.
Google Chrome Makes It Easier to Update Compromised Passwords
Quick Hits  |  5/19/2021  | 
A new capability will use Google's Duplex technology to alert people when their passwords are compromised and help change them.
How to Mitigate Against Domain Credential Theft
Commentary  |  5/18/2021  | 
Attackers routinely reuse stolen domain credentials. Here are some ways to thwart their access.
Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker
Commentary  |  5/12/2021  | 
Understanding a few basics about how password crackers think and behave could help you keep your users safer.
Why You Should Be Prepared to Pay a Ransom
Commentary  |  5/12/2021  | 
Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.
Cartoon Caption Winner: Greetings, Earthlings
Commentary  |  5/11/2021  | 
And the winner of Dark Reading's April cartoon caption contest is ...
Defending Against Web Scraping Attacks
Commentary  |  5/7/2021  | 
Web scraping attacks, like Facebook's recent data leak, can easily lead to more significant breaches.
Google Plans to Automatically Enable Two-Factor Authentication
Quick Hits  |  5/6/2021  | 
The company plans to automatically enroll users in two-step verification if their accounts are properly configured.
Newer Generic Top-Level Domains a Security 'Nuisance'
News  |  5/4/2021  | 
Ten years of passive DNS data shows classic TLDs such as .com and .net dominate newer TLDs in popularity and use.
Attacks Targeting ADFS Token Signing Certificates Could Become Next Big Threat
News  |  4/28/2021  | 
New research shows how threat actors can steal and decrypt signing certificates so SAML tokens can be forged.
Pandemic Drives Greater Need for Endpoint Security
Quick Hits  |  4/16/2021  | 
Endpoint security has changed. Can your security plan keep up?
Security Gaps in IoT Access Control Threaten Devices and Users
News  |  4/16/2021  | 
Researchers spot problems in how IoT vendors delegate device access across multiple clouds and users.
8 Security & Privacy Apps to Share With Family and Friends
Slideshows  |  4/9/2021  | 
Mobile apps to recommend to the people in your life who want to improve their online security and privacy.
NFT Thefts Reveal Security Risks in Coupling Private Keys & Digital Assets
Commentary  |  4/6/2021  | 
Compromised NFT accounts highlight security concerns inherent in the design of centralized systems.
How Us Shady Geeks Put Others Off Security
Commentary  |  3/19/2021  | 
Early adopters of security and privacy tools may be perceived by others as paranoid, which, in turn, may repel non-experts from protecting themselves online.
Facebook Expands Security Key Support to iOS & Android
News  |  3/18/2021  | 
Facebook's announcement arrives the same week Twitter enabled support for multiple security keys on user accounts.
COVID, Healthcare Data & the Dark Web: A Toxic Stew
Commentary  |  3/17/2021  | 
The growing treasure trove of healthcare data is proving irresistible -- and profitable -- to bad actors.
NSA Releases Guidance on Zero-Trust Architecture
Quick Hits  |  2/26/2021  | 
A new document provides guidance for businesses planning to implement a zero-trust system management strategy.
Strata Identity Raises $11M in Series A Round
Quick Hits  |  2/16/2021  | 
The series A round of funding, led by Menlo Ventures, will help Strata scale its distributed identity technology.
7 Things We Know So Far About the SolarWinds Attacks
Slideshows  |  2/11/2021  | 
Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.
SolarWinds Attack Reinforces Importance of Principle of Least Privilege
Commentary  |  2/9/2021  | 
Taking stock of least-privilege policies will go a long way toward hardening an organization's overall security posture.
Digital Identity Is the New Security Control Plane
Commentary  |  1/28/2021  | 
Simplifying the management of security systems helps provide consistent protection for the new normal.
COVID-19's Acceleration of Cloud Migration & Identity-Centric Security
Commentary  |  1/4/2021  | 
Here are some tips for updating access control methods that accommodate new remote working norms without sacrificing security.
HelpSystems Acquires Data Security Firm Vera
Quick Hits  |  12/24/2020  | 
The purchase is intended to increase London-based HelpSystems' file collaboration security capabilities.
White Ops Announces Its Acquisition
Quick Hits  |  12/23/2020  | 
A group including Goldman Sachs Merchant Banking Division, ClearSky Security, and NightDragon has purchased the human verification technology company.
Corporate Credentials for Sale on the Dark Web: How to Protect Employees and Data
Commentary  |  12/16/2020  | 
It's past time to retire passwords in favor of other methods for authenticating users and securing systems.
Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet
Commentary  |  12/2/2020  | 
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.
Evidence-Based Trust Gets Black Hat Europe Spotlight
News  |  11/23/2020  | 
An FPGA-based system could change the balance of power between hardware attackers and defenders within IT security.
Apple Issues Security Updates
Quick Hits  |  11/13/2020  | 
Vulnerabilities found in three most recent versions of macOS.
Credential Stuffing Fills E-commerce Pipeline in 2020
Quick Hits  |  11/12/2020  | 
There were 1.3 billion attacks in the third quarter alone, according to new analysis from Arkose Labs.
Barracuda to Acquire Fyde for Zero-Trust Capabilities
Quick Hits  |  11/11/2020  | 
Plans call for expanding the Barracuda CloudGen SASE platform.
Claroty Details Vulnerabilities in Schneider PLCs
Quick Hits  |  11/10/2020  | 
The vulnerabilities in a common line of programmable logic controllers could allow attackers to gain control of industrial equipment.
Cloud Usage, Biometrics Surge As Remote Work Grows Permanent
News  |  11/10/2020  | 
A new report reveals organizations are increasing their adoption of biometric authentication and disallowing SMS as a login method.
FTC Announces Consent Agreement With Zoom
Quick Hits  |  11/9/2020  | 
The agreement covers Zoom's misleading statements on security for its audio and video calling.
7 Online Shopping Tips for the Holidays
Slideshows  |  11/9/2020  | 
The holidays are right around the corner, and that means plenty of online shopping. These tips will help keep you safe.
How to Increase Voter Turnout & Reduce Fraud
Commentary  |  10/29/2020  | 
Digital identity verification has advanced, both technologically and legislatively. Is it the answer to simpler, safer voting?
6 Ways Passwords Fail Basic Security Tests
Slideshows  |  10/28/2020  | 
New data shows humans still struggle with password creation and management.
Neural Networks Help Users Pick More-Secure Passwords
News  |  10/26/2020  | 
Typically, blocklists are used to prevent users from picking easily guessable patterns, but a small neural network can do the same job and suggests that complex password requirements are not necessary.
Credential-Stuffing Attacks Plague Loyalty Programs
News  |  10/22/2020  | 
But that's not the only type of web attack cybercriminals have been profiting from.
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
Commentary  |  10/21/2020  | 
Attacks involving an unmanaged device and no malware expose gaps in cybersecurity that must be addressed.
Businesses Rethink Endpoint Security for 2021
News  |  10/20/2020  | 
The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?
Building the Human Firewall
Commentary  |  10/20/2020  | 
Cybersecurity was a challenge before COVID-19 sent millions of employees home to work from their own devices and networks. Now what?
Online Voting Is Coming, but How Secure Will It Be?
Commentary  |  10/13/2020  | 
It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.
Why MSPs Are Hacker Targets, and What To Do About It
Commentary  |  10/9/2020  | 
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.
Page 1 / 2   >   >>


Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35210
PUBLISHED: 2021-06-23
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
CVE-2021-27649
PUBLISHED: 2021-06-23
Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2021-29084
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in Security Advisor report management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29085
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in file sharing management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29086
PUBLISHED: 2021-06-23
Exposure of sensitive information to an unauthorized actor vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to obtain sensitive information via unspecified vectors.