The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Database Security
Breaking news, news analysis, and expert commentary on application security, including tools & technologies.
Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
May 26, 2023
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
by Dark Reading Staff, Dark Reading
May 26, 2023
1 MIN READ
Article
Google Cloud Bug Allows Server Takeover From CloudSQL Service
Researchers could access sensitive data and steal secrets by exploiting a vulnerability in GCP's security layer, eventually running rampant in the environment.
May 25, 2023
Researchers could access sensitive data and steal secrets by exploiting a vulnerability in GCP's security layer, eventually running rampant in the environment.
by Elizabeth Montalbano, Contributor, Dark Reading
May 25, 2023
5 MIN READ
Article
Sysco Data Breach Exposes Customer, Employee Data
Food distribution company first learned of the cyberattack in March 2023.
May 10, 2023
Food distribution company first learned of the cyberattack in March 2023.
by Dark Reading Staff, Dark Reading
May 10, 2023
1 MIN READ
Article
Trigona Ransomware Trolling for 'Poorly Managed' MS-SQL Servers
Vulnerable MS-SQL database servers have external connections and weak account credentials, researchers warn.
April 20, 2023
Vulnerable MS-SQL database servers have external connections and weak account credentials, researchers warn.
by Dark Reading Staff, Dark Reading
April 20, 2023
1 MIN READ
Article
Western Digital Hackers Demand 8-Figure Ransom Payment for Data
Western Digital has yet to comment on claims that the breach reported earlier this month led to data being stolen.
April 14, 2023
Western Digital has yet to comment on claims that the breach reported earlier this month led to data being stolen.
by Dark Reading Staff, Dark Reading
April 14, 2023
1 MIN READ
Article
Majority of US IT Pros Told to Keep Quiet About Data Breaches
To report or not report? While more than half of all companies have suffered a data breach, 71% of IT professionals say they have been told to not report an incident, which could mean legal jeopardy.
April 13, 2023
To report or not report? While more than half of all companies have suffered a data breach, 71% of IT professionals say they have been told to not report an incident, which could mean legal jeopardy.
by Robert Lemos, Contributing Writer, Dark Reading
April 13, 2023
5 MIN READ
Article
Millions of Pen Tests Show Companies' Security Postures Are Getting Worse
A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.
March 28, 2023
A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.
by Robert Lemos, Contributing Writer, Dark Reading
March 28, 2023
4 MIN READ
Article
Technology Firms Delivering Much-Sought Encryption-in-Use
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
March 17, 2023
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
by Robert Lemos, Contributing Writer, Dark Reading
March 17, 2023
5 MIN READ
Article
'Vile' Gang Duo Breaches Police Database, Impersonates Officers in Extortion Gambit
Two gang members are being charged for allegedly threatening to release personal information and impersonating law enforcement in an effort to dox victims.
March 15, 2023
Two gang members are being charged for allegedly threatening to release personal information and impersonating law enforcement in an effort to dox victims.
March 15, 2023
1 MIN READ
Article
Are We Doing Enough to Protect Our Unstructured Data?
Organizations are coming under pressure to protect their data, but does all data need the same security? To secure it, you first need to know what and where it is.
March 15, 2023
Organizations are coming under pressure to protect their data, but does all data need the same security? To secure it, you first need to know what and where it is.
by Adam Strange, Principal Analyst, Data Security
March 15, 2023
4 MIN READ
Article
Hacker Cracks Toyota Customer Search Tool
Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.
March 07, 2023
Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.
by Dark Reading Staff, Dark Reading
March 07, 2023
1 MIN READ
Article
Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist
The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.
February 28, 2023
The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.
by Robert Lemos, Contributing Writer, Dark Reading
February 28, 2023
4 MIN READ
Article
Student Medical Records Exposed After LAUSD Breach
"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse.
February 23, 2023
"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse.
by Dark Reading Staff, Dark Reading
February 23, 2023
1 MIN READ
Article
Zacks Investment Research Hack Exposes Data for 820K Customers
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
January 25, 2023
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
by Dark Reading Staff, Dark Reading
January 25, 2023
1 MIN READ
Article
Vulnerable Historian Servers Imperil OT Networks
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
January 18, 2023
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
by Robert Lemos, Contributing Writer, Dark Reading
January 18, 2023
4 MIN READ
Article