Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Cloud posted in November 2011
Major Email Providers Set Phish Trap
News  |  11/30/2011  | 
Agari's Email Trust Fabric finds fans at AOL, Google, Microsoft, and Yahoo. The goal: Stop spoofing of legitimate email domains.
Healthcare Breach Exposes Nearly 4 Million Patients' Data
News  |  11/18/2011  | 
California healthcare organization was in the midst of an encryption rollout when unencrypted machine with patent databases was stolen.
Verizon Uses Predictive Modeling To Detect Health Fraud
News  |  11/16/2011  | 
Verizon software can spot doctors prescribing excessive amounts of medication and other trends that indicate falsified billings.
Patients Have Security Concerns On Data Sharing
News  |  11/16/2011  | 
New report by PwC reveals what consumers think about data sharing, privacy and security, online consultations, social media in healthcare, and more.
Data Mining Snares Health Insurance Fraud
News  |  11/14/2011  | 
LexisNexis applies predictive modeling, a massive database, and high-performance computing cluster technology to spot health insurance fraud before claims are paid.
Encryption Security Lags In Healthcare?
News  |  11/14/2011  | 
Tech leaders warn policymakers that even as more electronic health records flood health IT systems, more encryption is needed.
Public Cloud Security Credentials Flunk A Research Test
News  |  11/10/2011  | 
Researchers who grabbed security credentials via Google code search advise caution regarding sensitive data and public cloud services.
Docs Warm Up to EHRs, Patients Want Paper
Commentary  |  11/3/2011  | 
While docs are gradually getting onboard with electronic health records, most patients worry about the security of their personal health info in cyberspace. What's behind the chasm?
Cloud Security Doubted By Most IT Executives
News  |  11/3/2011  | 
Two-thirds of IT pros don't believe they can secure cloud infrastructure as well as on-premises environments, research says.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27854
PUBLISHED: 2022-09-27
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
CVE-2021-27861
PUBLISHED: 2022-09-27
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)
CVE-2021-27862
PUBLISHED: 2022-09-27
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).
CVE-2021-27853
PUBLISHED: 2022-09-27
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
CVE-2022-39258
PUBLISHED: 2022-09-27
mailcow is a mailserver suite. A vulnerability innversions prior to 2022-09 allows an attacker to craft a custom Swagger API template to spoof Authorize links. This could redirect a victim to an attacker controller place to steal Swagger authorization credentials or create a phishing page to steal o...