News & Commentary

Content tagged with Database Security posted in April 2012
Security Bugs And Proofs Of Concept
Commentary  |  4/27/2012  | 
Oracle's recent patch contained exploit code
Nissan Hack A Harsh Reminder About Protecting Data Stores From Spies
News  |  4/26/2012  | 
News of corporate espionage attacks against Nissan offers security practitioners a reminder of the real reason they bring home a paycheck
Healthcare's Checklist Security Mentality Failing, Report Says
News  |  4/24/2012  | 
Despite conducting regular risk analysis, 27% of healthcare organizations suffered a data breach in the last 12 months, twice the percentage reported in 2010. Lack of cohesive security leadership might be to blame, report says.
Should FDA Assess Medical Device Defenses Against Hackers?
News  |  4/24/2012  | 
Federal advisory board calls for Congress to assign responsibility for preventing medical cyber-attacks.
2 Medicaid Data Breaches, 1 Weak Link: Employees
News  |  4/24/2012  | 
Second data breach at a state Medicaid agency in less than a month shows need to limit employee access to confidential data, regardless of other security procedures.
Online Calendar Mistakes Cost Doctors Group $100,000
News  |  4/23/2012  | 
HHS penalizes Phoenix Cardiac Surgery for violating HIPAA privacy regulations, including making patient appointments publicly available on the Internet.
Three Security Snags That Expose The Database
News  |  4/19/2012  | 
Insecure Web apps, no linkage to IAM, and poorly configured segmentation all contribute to database vulnerability
Using Reverse Proxies To Secure Databases
Commentary  |  4/12/2012  | 
A look at database monitoring and reverse proxies
Slide Show: 10 SQL Injection Tools For Database Pwnage
Slideshows  |  4/11/2012  | 
Black hat hackers and pen testers alike use these tools to dump data, perform privilege escalations, and effectively take over sensitive databases
Utah's Medicaid Data Breach Worse Than Expected
News  |  4/11/2012  | 
Utah Department of Technology Services (DTS) reveals 780,000 individuals have been affected by the theft of sensitive Medicaid information. That's far worse than initial estimates.
2 Healthcare Data Breaches Show Importance Of Encryption
News  |  4/5/2012  | 
Patient data from Howard University Hospital and California Department of Child Support Services wasn't fully encrypted, and one security expert wants to know why.
New York Moves To Protect Health Data Privacy
News  |  4/5/2012  | 
Should a simple trip to the podiatrist unlock your lifelong medical history? As electronic medical records are shared, complex privacy questions arise, prompting a new state committee to tackle patient privacy and HIE data access questions.
SQL Injection Still Slams SMBs
News  |  4/4/2012  | 
SQL injection attacks may have declined compared to other methods, but they are still a big concern among businesses large and small
Database Security On The Cheap
Commentary  |  4/4/2012  | 
A look at some free tools to help tackle database security


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Compliance and Risk Management Officer, AvePoint, Inc,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15601
PUBLISHED: 2018-08-21
apps/filemanager/handlers/upload/drop.php in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism.
CVE-2018-15603
PUBLISHED: 2018-08-21
An issue was discovered in Victor CMS through 2018-05-10. There is XSS via the Author field of the "Leave a Comment" screen.
CVE-2018-15598
PUBLISHED: 2018-08-21
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
CVE-2018-15599
PUBLISHED: 2018-08-21
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
CVE-2018-0501
PUBLISHED: 2018-08-21
The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.