Application Security // Database Security
News & Commentary
UK Loan Firm Wonga Suffers Financial Data Breach
Dark Reading Staff, Quick Hits
Customers in the UK and Poland may have had their bank account details compromised.
By Dark Reading Staff , 4/11/2017
Comment1 Comment  |  Read  |  Post a Comment
11 UK Charities Punished for Violating Data Privacy Law
Dark Reading Staff, Quick Hits
Organizations fined between 6,000 and 18,000 by UKs Information Commissioners Office.
By Dark Reading Staff , 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
To Attract and Retain Better Employees, Respect Their Data
Brian Vecci, Technical Evangelist, Varonis SystemsCommentary
A lack of privacy erodes trust that employees should have in management.
By Brian Vecci Technical Evangelist, Varonis Systems, 4/3/2017
Comment3 comments  |  Read  |  Post a Comment
ERP Attack Risks Come into Focus
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New highly critical SAP vulnerability highlights dangers against critical business software.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/16/2017
Comment0 comments  |  Read  |  Post a Comment
How to Secure Hyperconverged Infrastructures & Why It Is Different
Liviu Arsene, Senior E-threat Analyst, Bitdefender
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Harvest Season: Why Cyberthieves Want Your Compute Power
Dave Klein, Regional Director of Sales Engineering & Architecture, GuardiCoreCommentary
Attackers are hijacking compute power in order to pull off their other crimes.
By Dave Klein Regional Director of Sales Engineering & Architecture, GuardiCore, 2/9/2017
Comment0 comments  |  Read  |  Post a Comment
MongoDB Attack Shows Off Cyber Extortionists' New Tricks
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Ransomware operators are diversifying their cyber-extortion toolkit and expanding their range of targets.
By Ericka Chickowski Contributing Writer, Dark Reading, 1/10/2017
Comment0 comments  |  Read  |  Post a Comment
The Internet Of Things: When Bigger Is Not Better
Paul Vixie, Chairman & CEO, Farsight Security, Inc.Commentary
What happens when 10,000 companies add programmability and connectivity to their products, and we increase the Internets attack surface by a million times or more?
By Paul Vixie Chairman & CEO, Farsight Security, Inc., 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
Symantec To Buy LifeLock At $2.3 Billion
Dark Reading Staff, Quick Hits
Deal set to be finalized by Q1 2017 and financed by cash and $750 million of new debt.
By Dark Reading Staff , 11/22/2016
Comment2 comments  |  Read  |  Post a Comment
Oracle Announces Acquisition Of Dyn
Dark Reading Staff, Quick Hits
Oracle says purchase of the recently DDoSed DNS service is aimed expanding the companys cloud computing platform.
By Dark Reading Staff , 11/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Preparing For Government Data Requests After Apple Vs. FBI
Dark Reading Staff, CommentaryVideo
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.
By Dark Reading Staff , 10/31/2016
Comment0 comments  |  Read  |  Post a Comment
New Free Tool Stops Petya Ransomware & Rootkits
Sara Peters, Senior Editor at Dark ReadingNews
Meanwhile, Locky puts ransomware on the Check Point Top Three Global Malware List for the first time ever.
By Sara Peters Senior Editor at Dark Reading, 10/20/2016
Comment1 Comment  |  Read  |  Post a Comment
Database Breaches: An Alarming Lack Of Preparedness
John Moynihan, President, Minuteman GovernanceCommentary
It's no secret that databases are fertile ground for malicious activities. Here's how a seven-step process for monitoring known harbingers of an imminent attack can help reduce the risk.
By John Moynihan President, Minuteman Governance, 10/10/2016
Comment3 comments  |  Read  |  Post a Comment
Ex-Cardinal Exec Jailed For Hacking Astros
Dark Reading Staff, Quick Hits
Christopher Correa gets 46 months for unlawful access of rivals database and downloading confidential details.
By Dark Reading Staff , 7/20/2016
Comment1 Comment  |  Read  |  Post a Comment
Ubuntu Forums Database Hacked
Dark Reading Staff, Quick Hits
Canonical probe reveals user account details of 2 million stolen, passwords safe.
By Dark Reading Staff , 7/19/2016
Comment5 comments  |  Read  |  Post a Comment
5 Tips For Making Data Privacy Part Of The Companys Culture
Steve Zurier, Freelance WriterNews
Common sense steps organizations can take to protect corporate data.
By Steve Zurier Freelance Writer, 6/22/2016
Comment0 comments  |  Read  |  Post a Comment
Cloud Apps Just As Secure As On-Premise Apps, Say InfoSec Pros
Sara Peters, Senior Editor at Dark ReadingNews
Unfortunately, 75% of cloud apps will still fall afoul of the new EU General Data Protection Regulation, according to new studies.
By Sara Peters Senior Editor at Dark Reading, 6/9/2016
Comment0 comments  |  Read  |  Post a Comment
Stop Building Silos. Security Is Everyones Problem
Robert Reeves, CTO & Co-Founder, DaticalCommentary
Yes, its true that the speed of DevOps has made security more difficult. But that doesnt mean accelerated release cycles and secure applications have to be mutually exclusive.
By Robert Reeves CTO & Co-Founder, Datical, 4/29/2016
Comment2 comments  |  Read  |  Post a Comment
Malware At Root Of Bangladesh Bank Heist Lies To SWIFT Financial Platform
Sara Peters, Senior Editor at Dark ReadingNews
Customized malware hid $81 million of wire transfers until the money had been safely laundered.
By Sara Peters Senior Editor at Dark Reading, 4/25/2016
Comment1 Comment  |  Read  |  Post a Comment
10 Tips for Securing Your SAP Implementation
Sean Martin, CISSP | President, imsmartin
Without clear ownership of security for a critical business platform like SAP, it should come as no surprise that SAP cybersecurity continues to fall through the cracks among IT, admin, security and InfoSec teams.
By Sean Martin CISSP | President, imsmartin, 4/23/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio