Immutability in Cybersecurity: A Layer of Security Amidst Complexity and...
In modern security parlance, ‘immutable’ has three primary associations: immutable servers, immutable backup, and immutable data. The post Immutability in Cybersecurity: A Layer of Security Amidst...
View ArticleStolen Credentials Have Turned SaaS Apps Into Attackers’ PlaygroundsIndustry...
SaaS app log analysis highlights the rapid smash and grab raid: in, steal, and leave in 30 minutes. The post Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds appeared first on...
View ArticleStolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds
SaaS app log analysis highlights the rapid smash and grab raid: in, steal, and leave in 30 minutes. The post Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds appeared first on...
View ArticlePost-Quantum Cryptography Standards Officially Announced by NIST – a History...
SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography. The post Post-Quantum Cryptography Standards...
View ArticleHacker Conversations: Tom Anthony and Scratching an Itch Without Doing Harm
Many hackers trace their origin to an interest in, and early exposure to, computers. Tom Anthony is no different. The post Hacker Conversations: Tom Anthony and Scratching an Itch Without Doing Harm...
View ArticleUnlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA
SecurityWeek spoke with Mike Britton, CISO at Abnormal Security, to understand what the company has learned about current social engineering and phishing attacks. The post Unlocking the Front Door:...
View ArticleUnconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media...
National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage and a class action lawsuit, verifiable proof...
View ArticleUnconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media...
National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage and a class action lawsuit, verifiable proof...
View ArticleUnconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media...
National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage and a class action lawsuit, verifiable proof...
View ArticleNational Public Data Says Breach Impacts 1.3 Million PeopleIndustry Moves for...
National Public Data (NPD) has confirmed suffering a data breach, but the company says the incident only affects 1.3 million people in the US. The post National Public Data Says Breach Impacts 1.3...
View ArticleNational Public Data Says Breach Impacts 1.3 Million People
National Public Data (NPD) has confirmed suffering a data breach, but the company says the incident only affects 1.3 million people in the US. The post National Public Data Says Breach Impacts 1.3...
View ArticleWhy LinkedIn Developed Its Own AI-Powered Security Platform
An inside look at how LinkedIn developed an internal AI-assisted vulnerability management system to protect its massive infrastructure and user base. The post Why LinkedIn Developed Its Own AI-Powered...
View ArticleUnderstanding the ‘Morphology’ of Ransomware: A Deeper Dive
Ransomware isn't just about malware. It's about brands, trust, and the shifting allegiances of cybercriminals. The post Understanding the ‘Morphology’ of Ransomware: A Deeper Dive appeared first on...
View ArticleChina-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on...
Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level. The post China-Linked ‘Velvet Ant’ Hackers Exploited...
View ArticleChina-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on...
Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level. The post China-Linked ‘Velvet Ant’ Hackers Exploited...
View ArticleWhen Convenience Costs: CISOs Struggle With SaaS Security OversightIndustry...
SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When...
View ArticleWhen Convenience Costs: CISOs Struggle With SaaS Security Oversight
SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When...
View ArticleBlackByte Ransomware Gang Believed to Be More Active Than Leak Site...
Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs. The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first...
View ArticleBlackByte Ransomware Gang Believed to Be More Active Than Leak Site...
Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs. The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first...
View ArticleBlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests
Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs. The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first...
View Article