The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Database Security
Breaking news, news analysis, and expert commentary on application security, including tools & technologies.
Technology Firms Delivering Much-Sought Encryption-in-Use
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
March 17, 2023
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
by Robert Lemos, Contributing Writer, Dark Reading
March 17, 2023
5 MIN READ
Article
'Vile' Gang Duo Breaches Police Database, Impersonates Officers in Extortion Gambit
Two gang members are being charged for allegedly threatening to release personal information and impersonating law enforcement in an effort to dox victims.
March 15, 2023
Two gang members are being charged for allegedly threatening to release personal information and impersonating law enforcement in an effort to dox victims.
March 15, 2023
1 MIN READ
Article
Are We Doing Enough to Protect Our Unstructured Data?
Organizations are coming under pressure to protect their data, but does all data need the same security? To secure it, you first need to know what and where it is.
March 15, 2023
Organizations are coming under pressure to protect their data, but does all data need the same security? To secure it, you first need to know what and where it is.
by Adam Strange, Principal Analyst, Data Security
March 15, 2023
4 MIN READ
Article
Hacker Cracks Toyota Customer Search Tool
Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.
March 07, 2023
Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.
by Dark Reading Staff, Dark Reading
March 07, 2023
1 MIN READ
Article
Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist
The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.
February 28, 2023
The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.
by Robert Lemos, Contributing Writer, Dark Reading
February 28, 2023
4 MIN READ
Article
Student Medical Records Exposed After LAUSD Breach
"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse.
February 23, 2023
"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered by FERPA, not HIPAA, so parents have little recourse.
by Dark Reading Staff, Dark Reading
February 23, 2023
1 MIN READ
Article
Zacks Investment Research Hack Exposes Data for 820K Customers
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
January 25, 2023
Zacks Elite sign-ups for the period 1999–2005 were accessed, including name, address, email address, phone number, and the password associated with Zacks.com.
by Dark Reading Staff, Dark Reading
January 25, 2023
1 MIN READ
Article
Vulnerable Historian Servers Imperil OT Networks
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
January 18, 2023
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks.
by Robert Lemos, Contributing Writer, Dark Reading
January 18, 2023
4 MIN READ
Article
Quantum Decryption Breakthrough? Not So Fast
A paper by two dozen Chinese researchers maintains that near-future quantum computers could crack RSA-2048 encryption, but experts call the claims misleading.
January 10, 2023
A paper by two dozen Chinese researchers maintains that near-future quantum computers could crack RSA-2048 encryption, but experts call the claims misleading.
by Robert Lemos, Contributing Writer, Dark Reading
January 10, 2023
4 MIN READ
Article
Five Guys Data Breach Puts HR Data Under a Heat Lamp
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.
January 04, 2023
Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.
by Tara Seals, Managing Editor, News, Dark Reading
January 04, 2023
6 MIN READ
Article
Popular WAFs Subverted by JSON Bypass
Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.
December 12, 2022
Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.
by Robert Lemos, Contributing Writer, Dark Reading
December 12, 2022
3 MIN READ
Article
Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
November 17, 2022
Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
by Nathan Eddy, Contributing Writer, Dark Reading
November 17, 2022
6 MIN READ
Article
Thousands of Amazon RDS Snapshots Are Leaking Corporate PII
A service that allows organizations to back up data in the cloud can accidentally leak sensitive data to the public Internet, paving the way for abuse by threat actors.
November 16, 2022
A service that allows organizations to back up data in the cloud can accidentally leak sensitive data to the public Internet, paving the way for abuse by threat actors.
by Elizabeth Montalbano, Contributor, Dark Reading
November 16, 2022
5 MIN READ
Article
Nasty SQL Injection Bug in Zendesk Endangers Sensitive Customer Data
The API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.
November 15, 2022
The API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.
by Elizabeth Montalbano, Contributor, Dark Reading
November 15, 2022
5 MIN READ
Article
Amazon, Microsoft Cloud Leaks Highlight Lingering Misconfiguration Issues
Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
November 10, 2022
Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
by Robert Lemos, Contributing Writer, Dark Reading
November 10, 2022
4 MIN READ
Article