Bypassing Two-Factor Authentication
These techniques are not new, but they’re increasingly popular: …some forms of MFA are stronger than others, and recent events show that these weaker forms...
UK Spy Chief Hails Government Cell Tackling Kremlin Fake News
GCHQ boss says intelligence is being declassified on an unprecedented scale Read More
Over Half of Data Security Incidents Caused by Insiders
Most EMEA organizations don’t have a strategy for dealing with them Read More
Ukraine, Conti, and the law of unintended consequences
The Russian invasion of Ukraine has demonstrated the law of unintended consequences in a most unexpected way. By publicly backing the invasion, the heretofore most...
LAPSUS$ hacks Globant. 70GB of data leaked from IT firm
International IT and software development firm Globant has confirmed that an increasingly-notorious cybercrime gang breached its network and stole intellectual property and passwords. Read more...
IT Services Giant Admits $42m Fallout from Ransomware Attack
Atento case highlights the costs that can stem from serious breaches Read More
Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your digital stuff too. Whether it’s...
Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill
On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs...
Attackers compromise 94% of critical assets within four steps of initial breach
New research from XM Cyber analyzing the methods, attack paths, and impacts of cyberattacks has discovered that attackers can compromise 94% of critical assets within...
FBI adds LAPSUS$ data extortion gang to its “Most Wanted” list
The FBI is calling on members of the public to help it uncover members of an increasingly-notorious cybercrime gang. Read More