Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Database Security posted in January 2012
AT&T Tightens Up Tablet Security
News  |  1/27/2012  | 
AT&T has introduced new security tools that help healthcare providers better protect tablet-based patient data.
Database Password Storage Exposes Need For Better ID Management
News  |  1/25/2012  | 
DreamHost and other password breaches show weaknesses in the way passwords are stored
7 Tools To Tighten Healthcare Data Security
Slideshows  |  1/24/2012  | 
Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
Oracle CPU Contains Lowest Number Of Database Fixes Ever
News  |  1/18/2012  | 
Database security community concerned about Oracle's patch bottleneck
Patient Data Theft Sends IT Specialist To Jail
News  |  1/17/2012  | 
Atlanta man gets 13 months for hacking into former employer's computer database and stealing patient data for a competing medical practice.
Hack Attacks Now Leading Cause Of Data Breaches
News  |  1/12/2012  | 
Exclusive: Identity Theft Resource Center identifies hacking, followed by data lost in transit and insider attacks, as the leading data breach culprits in 2011.
Does NoSQL Mean No Security?
News  |  1/11/2012  | 
NoSQL databases offer an alternative to traditional relational databases but is immature and will introduce more risks
Health IT Managers Slow To Implement Cloud
News  |  1/11/2012  | 
Security concerns keep health IT pros from jumping on cloud computing faster, a KLAS study suggests.
More Patient Data Risks, Lawsuits Predicted In 2012
News  |  1/9/2012  | 
The new year promises to bring greater patient data risks as healthcare organizations increase their use of mobile technology and social media sites.
AntiSec Hacks Signal Same Old, Same Old In Database Insecurity
News  |  1/5/2012  | 
Hacktivist group takes down two law enforcement associations with ease


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22166
PUBLISHED: 2021-01-15
An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method
CVE-2021-22167
PUBLISHED: 2021-01-15
An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository
CVE-2021-22168
PUBLISHED: 2021-01-15
A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8.
CVE-2021-22171
PUBLISHED: 2021-01-15
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
CVE-2020-26414
PUBLISHED: 2021-01-15
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string.