News

  • 9 attack surface discovery and management tools

    PRIVACY PRIVACY Cyber asset attack surface management (CAASM) or external attack surface management (EASM) solutions are designed to quantify the attack surface and minimize and harden it. The goal with CAASM tools is to give the adversary as little information about the security posture of the business as possible while still maintaining critical business services.…

    Read More

  • ForgeRock, Double Secret Octopus offer passwordless authentication for enterprises

    PRIVACY PRIVACY ForegeRock is adding a new passwordless authentication capability, called Enterprise Connect Passwordless, to its flagship Identity Platform product to help eliminate the need for user passwords in large organizations. ForgeRock has partnered with Israel-based Secret Double Octopus to offer the new feature set, designed to allow companies to integrate passwordless technology into enterprise…

    Read More

  • ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises

    PRIVACY PRIVACY ForegeRock is adding a new passwordless authentication capability, called Enterprise Connect Passwordless, to its flagship Identity Platform product to help eliminate the need for user passwords in large organizations. ForgeRock has partnered with Israel-based Secret Double Octopus to offer the new feature set, designed to allow companies to integrate passwordless technology into enterprise…

    Read More

  • Mispadu Trojan Steals 90,000+ Banking Credentials From Latin American Victims

    PRIVACY PRIVACY These included a number of government websites: 105 in Chile, 431 in Mexico and 265 in Peru Read More

    Read More

  • KillNet Group Uses DDoS Attacks Against Azure-Based Healthcare Apps

    PRIVACY PRIVACY Microsoft said it saw between 40 and 60 daily attacks in February Read More

    Read More

  • BreachForums Admin Arrested in New York

    PRIVACY PRIVACY Conor Brian Fitzpatrick of Peekskill was apprehended last Wednesday following an FBI investigation Read More

    Read More

  • CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws

    PRIVACY PRIVACY Last week, the US Cybersecurity and Infrastructure Security Agency (CISA) announced the launch of the Ransomware Vulnerability Warning Pilot (RVWP) program to “proactively identify information systems that contain security vulnerabilities commonly associated with ransomware attacks.” Once the program identifies vulnerable systems, regional CISA personnel will notify them so they can mitigate the flaws…

    Read More

  • Why You Should Opt Out of Sharing Data With Your Mobile Provider

    PRIVACY PRIVACY A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device — unless and until you affirmatively opt out of this data collection. Here’s a…

    Read More

  • BianLian ransomware group shifts focus to extortion

    PRIVACY PRIVACY Ransomware group BianLian has shifted the main focus of its attacks away from encrypting the files of its victims to focusing more on extortion as a means to extract payments from victims, according to cybersecurity firm Redacted. The shift in the operating model comes as a result of Avast’s release of a decryption…

    Read More

  • Know Your Needs: Get Packing for Your Cybersecurity Roadmap

    PRIVACY PRIVACY Every roadmap needs a starting point. With a cybersecurity roadmap, the best place to start is for you to know your needs. Read More

    Read More

News, Advisories and much more

Exit mobile version