-
Deadbolt Ransomware Extorts Vendors and Customers
PRIVACY PRIVACY New report provides in-depth look at novel NAS-based threat Read More
-
8 top multi-factor authentication products and how to choose an MFA solution
PRIVACY PRIVACY Today’s credential-based attacks are much more sophisticated. Whether it’s advanced phishing techniques, credential stuffing, or even credentials compromised through social engineering or breaches of a third-party service, credentials are easily the most vulnerable point in defending corporate systems. All these attacks key on traditional credentials, usernames and passwords, which are past their expiration…
-
Software Supply Chain Attacks Soar 742% in Three Years
PRIVACY PRIVACY Sonatype reveals scale of threats to open source ecosystem Read More
-
How Card Skimming Disproportionally Affects Those Most In Need
PRIVACY PRIVACY When people banking in the United States lose money because their payment card got skimmed at an ATM, gas pump or grocery store checkout terminal, they may face hassles or delays in recovering any lost funds, but they are almost always made whole by their financial institution. Yet, one class of Americans —…
-
Zoom Patches High-Severity Flaw in macOS Client
PRIVACY PRIVACY The flaw could allow an attacker to connect to clients and control the Zoom Apps running in it Read More
-
HelpSystems Patch Falls Short, RCE Vulnerability in Cobalt Strike Remains
PRIVACY PRIVACY Certain components in Java Swing will interpret text as HTML content if it starts with Read More
-
Spyder Loader Malware Deployed Against Hong Kong Organizations
PRIVACY PRIVACY The attackers reportedly remained active on some networks for more than a year Read More
-
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself
PRIVACY PRIVACY Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for a period of nearly five years. Toyota says the breach is the result of a subcontractor posting source code for Toyota’s “T-Connect” app on the software development platform GitHub in December 2017. This…
-
4 Business Goals You Can Achieve While Scaling Cybersecurity
PRIVACY PRIVACY There are at least four business goals that organizations can achieve by scaling their cybersecurity programs through CIS SecureSuite Membership. Read More
-
GitGuardian adds IaC scanning to code security platform to protect SDLC
PRIVACY PRIVACY GitGuardian has added infrastructure-as-code (IaC) scanning to its code security platform to enhance the security of software development. The firm said the new feature will help security and development teams write, maintain, and run secure code, protecting the software development lifecycle (SDLC) against risks like tampering, code leakage and hardcoded credentials. The release…