Category Archives: News

Anonymous Claims to Have Leaked Over 360,000 Files From Russian Federal Agency

Read Time:6 Second

Anonymous revealed it has leaked files from the agency responsible for the supervision of communications, information technology and mass media

Read More

Are Ukraine’s drone capabilities being throttled in Russia-Ukraine conflict?

Read Time:31 Second

Chinese drone producer DJI Global has been accused of limiting the capabilities of its AeroScope technology for the Ukrainian army, giving a significant air reconnaissance edge to Russian invaders amid the Russia-Ukraine conflict. The unconfirmed claims were made by a Twitter user on March 10.

Volodymyr Shymanskyy, co-founder of Blynk IoT Platform, made the claims on Twitter. He said his information comes from its working group within the Ukrainian Forces. A DJI spokesperson in the U.S. rebuffed the accusations, stating that a technical problem is responsible for some systems malfunctioning in Ukraine.

To read this article in full, please click here

Read More

Nearly 70% of tested ServiceNow instances leaking data

Read Time:30 Second

A configuration error in the SaaS platform of an S&P 500 company is leaking data on the internet. News of the misconfiguration mistake found in nearly 70% of ServiceNow instances tested was reported Wednesday by AppOmni, a SaaS security provider.

According to AppOmni, the misconfiguration resulted from a combination of customer-managed configurations and over-provisioning of permissions to guest users. ServiceNow has more than 25,000 customers, most of them with 50 to 200 employees and with revenues in the $1 million to $10 million range.

To read this article in full, please click here

Read More

Operationalizing a “think like the enemy” strategy

Read Time:39 Second

Security professionals have always been told to “think like the enemy.”  This philosophy could start with a series of questions like: How could an adversary gain a foothold in one of our systems? How would they circumvent our security controls? How would they find and exfiltrate our sensitive data? Armed with knowledge about what an adversary would do, security teams could then design countermeasures to impede or even stop the bad guys in the tracks.

Good strategy, but most security professionals don’t have the knowledge or skills to take an adversary’s perspective. CISOs, recognizing the value of thinking like the enemy, have overcome this deficit by conducting penetration testing or red teaming exercises, attacking themselves to test their defenses.   

To read this article in full, please click here

Read More