News & Commentary

Content tagged with Database Security posted in December 2011
App And Database Security: Two Halves Of A Whole
News  |  12/28/2011  | 
Limit application privileges to the database and sanitize input to improve data security
Database Security Proxies
Commentary  |  12/22/2011  | 
Using DAM as a security proxy
Data Security, Top Down
Commentary  |  12/15/2011  | 
Focus on what needs to be done, not how to do it
5 Big Database Breaches Of Late 2011
News  |  12/15/2011  | 
Healthcare breaches have dominated the second half of the year. Consider these lessons learned.
Five Big Database Breaches Of 2011's Second Half
News  |  12/14/2011  | 
Healthcare breaches dominate since the summer, with plenty of lessons learned
Can Security Teams And DBAs Play Nicely?
News  |  12/9/2011  | 
Many organizations see database security projects arrive DOA because the DBA is not on board
Patient Data Losses Jump 32%
News  |  12/7/2011  | 
Growing use of mobile devices in healthcare has intensified the security risk associated with managing patient data.
ADMP: DAM For Web Apps
Commentary  |  12/7/2011  | 
A look at the technology that combines application and database protection


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.