News

  • Meta Takes Down Over 200 Covert Influence Operations Since 2017

    PRIVACY PRIVACY The most common location for influence operations was Russia, according to Meta Read More

    Read More

  • How to Surrender to a Drone

    PRIVACY PRIVACY The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone: “Seeing the drone in the field of view, make eye contact with it,” the video instructs. Soldiers should then raise their arms and signal they’re ready to follow. After that the drone will move up and…

    Read More

  • Mobile App Users at Risk as API Keys of Email Marketing Services Exposed

    PRIVACY PRIVACY Leaked API keys allow threat actors to perform a variety of unauthorized actions Read More

    Read More

  • NIST to Scrap SHA-1 Algorithm by 2030

    PRIVACY PRIVACY The agency said it will stop using SHA-1 in its last remaining specified protocols by December 31 2030 Read More

    Read More

  • What is SASE

    PRIVACY PRIVACY Secured Access Service Edge (SASE) is an evolving cloud-focused architecture that was released by Gartner in 2019. SASE is designed to solve the problem of network performance and limited security visibility for distributed corporate business systems (infrastructure, platforms, and applications) in the cloud or in the corporate data center as well as the…

    Read More

  • API Vulnerabilities Discovered in LEGO Marketplace

    PRIVACY PRIVACY The vulnerabilities, which are now fixed, could have put sensitive customer data at risk Read More

    Read More

  • Friday Squid Blogging: Squid in Concert

    PRIVACY PRIVACY Squid is performing a concert in London in February. If you don’t know what their music is like, try this or this or this. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read…

    Read More

  • BrandPost: One-Policy Framework, Zero Trust, and Ops teams

    PRIVACY PRIVACY In today’s digital era, customers expect information, resources, and services to be readily available from anywhere in the world. To deliver on customers’ expectations and leverage the best of on-premises and public cloud offerings, many enterprises use a mix of on-premises and cloud-based architectures. The freedom to choose from many architectures and deployment…

    Read More

  • As Long as We’re on the Subject of CAPTCHAs

    PRIVACY PRIVACY There are these. Read More

    Read More

  • Agenda Ransomware Switches to Rust to Attack Critical Infrastructure

    PRIVACY PRIVACY Victim companies have a combined revenue of around $550m Read More

    Read More

News, Advisories and much more

Exit mobile version