News

  • Multi-factor authentication fatigue attacks are on the rise: How to defend against them

    PRIVACY PRIVACY Credential compromise has been one of the top causes for network security breaches for a long time, which has prompted more organizations to adopt multi-factor authentication (MFA) as a defense. While enabling MFA for all accounts is highly encouraged and a best practice, the implementation details matter because attackers are finding ways around…

    Read More

  • Iranian Hackers Hid in Albanian Networks for Over a Year

    PRIVACY PRIVACY CISA report reveals extent of state-backed campaign Read More

    Read More

  • Former Broadcom engineer gets eight months in prison for trade secrets theft

    PRIVACY PRIVACY Peter Kisang Kim admitted to stealing Broadcom data related to its Trident family of network switching and cloud networking chipsets, while working for a Chinese startup. Read More

    Read More

  • Microsoft Upgrades Windows 11 With New Security Features

    PRIVACY PRIVACY The list includes application control enhancements and vulnerable drivers protection, among others Read More

    Read More

  • SIM Swapper Abducted, Beaten, Held for $200k Ransom

    PRIVACY PRIVACY A Florida teenager who served as a lackey for a cybercriminal group that specializes in cryptocurrency thefts was beaten and kidnapped last week by a rival cybercrime gang. The teen’s captives held guns to his head while forcing him to record a video message pleading with his crew to fork over a $200,000…

    Read More

  • 350K Open-Source Projects At Risk of Supply Chain Vulnerability

    PRIVACY PRIVACY The flaw resides in the tarfile module, automatically installed in any Python project Read More

    Read More

  • NCSC: British Retailers Need to Move Beyond Passwords

    PRIVACY PRIVACY The UK’s national cybersecurity agency also advised organizations on what steps they should take if their brand has been spoofed online Read More

    Read More

  • Report: The state of secure identity 2022

    PRIVACY PRIVACY A new report from Okta has found that credential stuffing as a means of breaching Customer Identity and Access Management (CIAM) services is accelerating, fuelled by password reuse coupled with malicious bots and other automated tools. The State of Secure Identity 2022 report, which is based on self-reported data from customers of Okta’s…

    Read More

  • Multiple Vulnerabilities Discovered in Dataprobe’s iBoot-PDUs

    PRIVACY PRIVACY They pose a number of risks to Dataprobe, including giving control of the iBoot-PDU to attackers Read More

    Read More

  • Two-Fifths of US Consumers Suffer Personal Data Theft

    PRIVACY PRIVACY Those suffering emotional and physical impact surges Read More

    Read More

News, Advisories and much more

Exit mobile version