Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

News & Commentary
Cyber Analytics Database Exposed 5 Billion Records Online
Dark Reading Staff, Quick Hits
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Encryption Helps Companies Avoid Breach Notifications
Robert Lemos, Contributing WriterNews
With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds.
By Robert Lemos Contributing Writer, 6/2/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Greetings, Earthlings
John Klossner, CartoonistCommentary
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 4/22/2021
Comment17 comments  |  Read  |  Post a Comment
NIST Publishes Guide for Securing Hotel Property Management Systems
Dark Reading Staff, Quick Hits
These sensitive systems store guests' personal data and payment-card information.
By Dark Reading Staff , 4/1/2021
Comment0 comments  |  Read  |  Post a Comment
Ghost Users Haunt Healthcare Firms
Dark Reading Staff, Quick Hits
Data security hygiene severely lacking among healthcare firms, new research shows.
By Dark Reading Staff , 3/30/2021
Comment0 comments  |  Read  |  Post a Comment
In the Rush to Embrace Hybrid Cloud, Don't Forget About Security
Ganesh Pai, CEO, UptycsCommentary
Cloud service providers typically only secure the infrastructure itself, while customers are responsible for their data and application security.
By Ganesh Pai CEO, Uptycs, 3/30/2021
Comment0 comments  |  Read  |  Post a Comment
Intel, Microsoft Aim for Breakthrough in DARPA Encryption Project
Robert Lemos, Contributing WriterNews
Together, the vendor giants aim to make "in use" encryption -- also known as "fully homomorphic encryption" -- economical and practical.
By Robert Lemos Contributing Writer, 3/8/2021
Comment0 comments  |  Read  |  Post a Comment
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical DirectorCommentary
With so much automation in code writing process, results are rarely double-checked, which opens the door to vulnerabilities and downright danger.
By Dr. Jethro Beekman Technical Director, 3/3/2021
Comment2 comments  |  Read  |  Post a Comment
7 Things We Know So Far About the SolarWinds Attacks
Jai Vijayan, Contributing Writer
Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.
By Jai Vijayan Contributing Writer, 2/11/2021
Comment0 comments  |  Read  |  Post a Comment
Web Application Attacks Grow Reliant on Automated Tools
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers often use automation in fuzzing attacks, injection attacks, fake bots, and application DDoS attacks.
By Kelly Sheridan Staff Editor, Dark Reading, 2/4/2021
Comment0 comments  |  Read  |  Post a Comment
Medical Imaging Leaks Highlight Unhealthy Security Practices
Robert Lemos, Contributing WriterNews
More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security firm says.
By Robert Lemos Contributing Writer, 12/15/2020
Comment0 comments  |  Read  |  Post a Comment
Kmart Hit by Egregor Ransomware
Dark Reading Staff, Quick Hits
Egregor is also behind recent attacks on UbiSoft and Barnes & Noble.
By Dark Reading Staff , 12/4/2020
Comment0 comments  |  Read  |  Post a Comment
Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely
Robert Lemos, Contributing WriterNews
Homomorphic encryption and federated learning could allow groups to share data and analysis while protecting the actual information.
By Robert Lemos Contributing Writer, 12/4/2020
Comment0 comments  |  Read  |  Post a Comment
5 Steps Every Company Should Take to Avoid Data Theft Risk
Bradford K. Newman, Principal, Litigation / Chair of North America Trade Secrets PracticeCommentary
It's never been easier for employees to download company data and take it with them to their next gig.
By Bradford K. Newman Principal, Litigation / Chair of North America Trade Secrets Practice, 11/12/2020
Comment1 Comment  |  Read  |  Post a Comment
3 Tips For Successfully Running Tech Outside the IT Department
Patrick Kehoe, Chief Marketing and Strategy Officer, CoalfireCommentary
When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.
By Patrick Kehoe Chief Marketing and Strategy Officer, Coalfire, 11/11/2020
Comment0 comments  |  Read  |  Post a Comment
WordPress Plug-in Updated in Rare Forced Action
Dark Reading Staff, Quick Hits
The Logonizer login security plug-in was automatically updated to patch a SQL injection vulnerability.
By Dark Reading Staff , 10/22/2020
Comment0 comments  |  Read  |  Post a Comment
Ubiq Rolls Out Encryption-as-a-Service Platform Aimed at Developers
Robert Lemos, Contributing WriterNews
A few lines of code and two API calls is all that it takes for developers to add encryption to their applications, startup says.
By Robert Lemos Contributing Writer, 10/21/2020
Comment0 comments  |  Read  |  Post a Comment
Barnes & Noble Warns Customers About Data Breach
Dark Reading Staff, Quick Hits
Famed bookseller says non-financial data was exposed in a new attack.
By Dark Reading Staff , 10/15/2020
Comment0 comments  |  Read  |  Post a Comment
Software AG Continues Efforts Against $20M Ransomware Attack
Dark Reading Staff, Quick Hits
The attack, which now includes extortion components, has moved into its second week.
By Dark Reading Staff , 10/12/2020
Comment0 comments  |  Read  |  Post a Comment
Imperva Agrees to Buy jSonar
Dark Reading Staff, Quick Hits
The deal is expected to close in mid-October.
By Dark Reading Staff , 10/1/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33818
PUBLISHED: 2021-06-18
An issue was discovered in UniFi Protect G3 FLEX Camera Version UVC.v4.30.0.67. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service.
CVE-2021-33820
PUBLISHED: 2021-06-18
An issue was discovered in UniFi Protect G3 FLEX Camera Version UVC.v4.30.0.67.Attacker could send a huge amount of TCP SYN packet to make web service's resource exhausted. Then the web server is denial-of-service.
CVE-2021-33822
PUBLISHED: 2021-06-18
An issue was discovered on 4GEE ROUTER HH70VB Version HH70_E1_02.00_22. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service.
CVE-2020-18442
PUBLISHED: 2021-06-18
Infinite Loop in zziplib v0.13.69 allows remote attackers to cause a denial of service via the return value "zzip_file_read" in the function "unzzip_cat_file".
CVE-2021-3604
PUBLISHED: 2021-06-18
Secure 8 (Evalos) does not validate user input data correctly, allowing a remote attacker to perform a Blind SQL Injection. An attacker could exploit this vulnerability in order to extract information of users and administrator accounts stored in the database.