The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Securing Identities in the Cloud
Oct 03, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Securing Identities in the Cloud
Oct 03, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Securing Identities in the Cloud
Oct 03, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Database Security
Breaking news, news analysis, and expert commentary on application security, including tools & technologies.
Companies Explore Ways to Safeguard Data in the Age of LLMs
Generative AI models are forcing companies to become creative about how they keep employees from giving away sensitive data.
September 18, 2023
Generative AI models are forcing companies to become creative about how they keep employees from giving away sensitive data.
by Robert Lemos, Contributing Writer, Dark Reading
September 18, 2023
5 MIN READ
Article
London Police Warned to Stay Vigilant Amid Major Data Breach
Hackers hit a third-party contractor's IT systems, but they didn't steal any addresses or financial details, officials say.
August 28, 2023
Hackers hit a third-party contractor's IT systems, but they didn't steal any addresses or financial details, officials say.
by Dark Reading Staff, Dark Reading
August 28, 2023
1 MIN READ
Article
Tesla Data Breach Investigation Reveals Inside Job
The carmaker also reported it's taken legal action against the former employees involved in the data breach, which involved more than 75,000 names.
August 21, 2023
The carmaker also reported it's taken legal action against the former employees involved in the data breach, which involved more than 75,000 names.
by Dark Reading Staff, Dark Reading
August 21, 2023
2 MIN READ
Article
Symmetry Systems Closes $17.7M To Scale its AI-Powered Data Security Platform
August 09, 2023
August 09, 2023
3 MIN READ
Article
Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics
The group continues to target SQL servers, adding the Remcos RAT, BatCloak, and Metasploit in an attack that shows advance obfuscation methods.
August 07, 2023
The group continues to target SQL servers, adding the Remcos RAT, BatCloak, and Metasploit in an attack that shows advance obfuscation methods.
by Elizabeth Montalbano, Contributor, Dark Reading
August 07, 2023
3 MIN READ
Article
Burger King Serves Up Sensitive Data, No Mayo
The incident marks the second time since 2019 that a misconfiguration could have let threat actors "have it their way" when it comes to BK's data.
August 04, 2023
The incident marks the second time since 2019 that a misconfiguration could have let threat actors "have it their way" when it comes to BK's data.
by Dark Reading Staff, Dark Reading
August 04, 2023
1 MIN READ
Article
NATO Hacked? Yes, Claims Hacktivist Crew
NATO's cyber experts are looking into the potential breach, which could imply a dangerous compromise of internal systems.
July 28, 2023
NATO's cyber experts are looking into the potential breach, which could imply a dangerous compromise of internal systems.
by Dark Reading Staff, Dark Reading
July 28, 2023
1 MIN READ
Article
7 in 10 MSPs Name Data Security and Network Security As Their Top IT Priorities for 2023
July 27, 2023
July 27, 2023
2 MIN READ
Article
P2P Self-Replicating Cloud Worm Targets Redis
Although not all Redis instances are vulnerable to the P2P worm variant, all of them can expect a compromise attempt, researchers warn.
July 19, 2023
Although not all Redis instances are vulnerable to the P2P worm variant, all of them can expect a compromise attempt, researchers warn.
by Dark Reading Staff, Dark Reading
July 19, 2023
2 MIN READ
Article
VirusTotal Data Leak Affects 5K+ Users
Some of the users who were impacted include the US Department of Justice, the NSA, and the FBI, alongside German intelligence agencies.
July 18, 2023
Some of the users who were impacted include the US Department of Justice, the NSA, and the FBI, alongside German intelligence agencies.
by Dark Reading Staff, Dark Reading
July 18, 2023
1 MIN READ
Article
Microsoft 'Logging Tax' Hinders Incident Response, Experts Warn
A recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish it.
July 17, 2023
A recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish it.
by Becky Bracken, Editor, Dark Reading
July 17, 2023
3 MIN READ
Article
LetMeSpy Phone-Tracking App Hacked, Revealing User Data
With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.
June 28, 2023
With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.
by Dark Reading Staff, Dark Reading
June 28, 2023
1 MIN READ
Article
Trans-Rights Hacktivists Steal City of Ft. Worth's Data
In a move to embarrass the city, hacking group known as SiegedSec accessed thousands of files with administrator logins, but it's making no ransom demands.
June 27, 2023
In a move to embarrass the city, hacking group known as SiegedSec accessed thousands of files with administrator logins, but it's making no ransom demands.
by Dark Reading Staff, Dark Reading
June 27, 2023
2 MIN READ
Article
It's Open Season on Law Firms for Ransomware & Cyberattacks
Law firms have an ethical responsibility to protect their clients' sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to shore up cybersecurity.
June 26, 2023
Law firms have an ethical responsibility to protect their clients' sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to shore up cybersecurity.
by Becky Bracken, Editor, Dark Reading
June 26, 2023
5 MIN READ
Article
Azure AD 'Log in With Microsoft' Authentication Bypass Affects Thousands
The "nOAuth" attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn.
June 22, 2023
The "nOAuth" attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn.
by Tara Seals, Managing Editor, News, Dark Reading
June 22, 2023
6 MIN READ
Article