-
Meta Takes Down Over 200 Covert Influence Operations Since 2017
PRIVACY PRIVACY The most common location for influence operations was Russia, according to Meta Read More
-
How to Surrender to a Drone
PRIVACY PRIVACY The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone: “Seeing the drone in the field of view, make eye contact with it,” the video instructs. Soldiers should then raise their arms and signal they’re ready to follow. After that the drone will move up and…
-
Mobile App Users at Risk as API Keys of Email Marketing Services Exposed
PRIVACY PRIVACY Leaked API keys allow threat actors to perform a variety of unauthorized actions Read More
-
NIST to Scrap SHA-1 Algorithm by 2030
PRIVACY PRIVACY The agency said it will stop using SHA-1 in its last remaining specified protocols by December 31 2030 Read More
-
What is SASE
PRIVACY PRIVACY Secured Access Service Edge (SASE) is an evolving cloud-focused architecture that was released by Gartner in 2019. SASE is designed to solve the problem of network performance and limited security visibility for distributed corporate business systems (infrastructure, platforms, and applications) in the cloud or in the corporate data center as well as the…
-
API Vulnerabilities Discovered in LEGO Marketplace
PRIVACY PRIVACY The vulnerabilities, which are now fixed, could have put sensitive customer data at risk Read More
-
Friday Squid Blogging: Squid in Concert
PRIVACY PRIVACY Squid is performing a concert in London in February. If you don’t know what their music is like, try this or this or this. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read…
-
BrandPost: One-Policy Framework, Zero Trust, and Ops teams
PRIVACY PRIVACY In today’s digital era, customers expect information, resources, and services to be readily available from anywhere in the world. To deliver on customers’ expectations and leverage the best of on-premises and public cloud offerings, many enterprises use a mix of on-premises and cloud-based architectures. The freedom to choose from many architectures and deployment…
-
As Long as We’re on the Subject of CAPTCHAs
PRIVACY PRIVACY There are these. Read More
-
Agenda Ransomware Switches to Rust to Attack Critical Infrastructure
PRIVACY PRIVACY Victim companies have a combined revenue of around $550m Read More