Quantcast
Channel: Kevin Townsend - SecurityWeek
Browsing all 132 articles
Browse latest View live

Immutability in Cybersecurity: A Layer of Security Amidst Complexity and...

In modern security parlance, ‘immutable’ has three primary associations: immutable servers, immutable backup, and immutable data. The post Immutability in Cybersecurity: A Layer of Security Amidst...

View Article


Stolen Credentials Have Turned SaaS Apps Into Attackers’ PlaygroundsIndustry...

SaaS app log analysis highlights the rapid smash and grab raid: in, steal, and leave in 30 minutes. The post Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds appeared first on...

View Article


Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds

SaaS app log analysis highlights the rapid smash and grab raid: in, steal, and leave in 30 minutes. The post Stolen Credentials Have Turned SaaS Apps Into Attackers’ Playgrounds appeared first on...

View Article

Post-Quantum Cryptography Standards Officially Announced by NIST – a History...

SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography. The post Post-Quantum Cryptography Standards...

View Article

Hacker Conversations: Tom Anthony and Scratching an Itch Without Doing Harm

Many hackers trace their origin to an interest in, and early exposure to, computers. Tom Anthony is no different. The post Hacker Conversations: Tom Anthony and Scratching an Itch Without Doing Harm...

View Article


Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA

SecurityWeek spoke with Mike Britton, CISO at Abnormal Security, to understand what the company has learned about current social engineering and phishing attacks. The post Unlocking the Front Door:...

View Article

Unconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media...

National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage and a class action lawsuit, verifiable proof...

View Article

Unconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media...

National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage and a class action lawsuit, verifiable proof...

View Article


Unconfirmed Hack of 2.9 Billion Records at National Public Data Sparks Media...

National Public Data (NPD) is at the center of controversy with allegations of a massive data breach involving 2.9 billion records. Despite media coverage and a class action lawsuit, verifiable proof...

View Article


National Public Data Says Breach Impacts 1.3 Million PeopleIndustry Moves for...

National Public Data (NPD) has confirmed suffering a data breach, but the company says the incident only affects 1.3 million people in the US. The post National Public Data Says Breach Impacts 1.3...

View Article

National Public Data Says Breach Impacts 1.3 Million People

National Public Data (NPD) has confirmed suffering a data breach, but the company says the incident only affects 1.3 million people in the US. The post National Public Data Says Breach Impacts 1.3...

View Article

Why LinkedIn Developed Its Own AI-Powered Security Platform

An inside look at how LinkedIn developed an internal AI-assisted vulnerability management system to protect its massive infrastructure and user base. The post Why LinkedIn Developed Its Own AI-Powered...

View Article

Understanding the ‘Morphology’ of Ransomware: A Deeper Dive

Ransomware isn't just about malware. It's about brands, trust, and the shifting allegiances of cybercriminals. The post Understanding the ‘Morphology’ of Ransomware: A Deeper Dive appeared first on...

View Article


China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on...

Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level. The post China-Linked ‘Velvet Ant’ Hackers Exploited...

View Article

China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on...

Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level. The post China-Linked ‘Velvet Ant’ Hackers Exploited...

View Article


When Convenience Costs: CISOs Struggle With SaaS Security OversightIndustry...

SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When...

View Article

When Convenience Costs: CISOs Struggle With SaaS Security Oversight

SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When...

View Article


BlackByte Ransomware Gang Believed to Be More Active Than Leak Site...

Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs. The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first...

View Article

BlackByte Ransomware Gang Believed to Be More Active Than Leak Site...

Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs. The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first...

View Article

BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests

Cisco Talos has a blog post on the BlackByte ransomware group’s continuing evolution and new TTPs. The post BlackByte Ransomware Gang Believed to Be More Active Than Leak Site Suggests appeared first...

View Article
Browsing all 132 articles
Browse latest View live