-
California Signs Internet Privacy Legislation to Boost Children’s Safety Online
PRIVACY PRIVACY The new legislation will implement some of the strictest privacy requirements in the US Read More
-
Europol and Bitdefender Jointly Release LockerGoga Decryptor
PRIVACY PRIVACY LockerGoga targeted several companies in Norway and across the US in 2019 Read More
-
Grand Theft Auto Publisher Rockstar Games Hacked
PRIVACY PRIVACY The threat actor ‘teapotuberhacker’ could be linked to the Lapsus$ hacking group Read More
-
Hackers Admit Destroying InterContinental Hotels Group’s Data ‘For Fun’
PRIVACY PRIVACY They tried to conduct a ransomware attack against IHG and upon failing, decided to delete the data Read More
-
CrowdStrike adds XDR, other capabilites across 4 key security products
PRIVACY PRIVACY CrowdStrike on Tuesday announced enhancements to four of its security products–Falcon Insight, CrowdStrike Cloud Security, Humio, and Falcon Discover. The new features include XDR (extended detection and response), enhanced zero trust, new log management, and IoT secuirty capabilities. The first new offering is an extension to Crowdstrike’s Falcon Insight by including XDR capabilities.…
-
Quantum Computing Already Putting Data at Risk, Cyber Pros Agree
PRIVACY PRIVACY In the Deloitte poll, 50.2% of respondents said their organization is at risk of ‘harvest now, decrypt later’ attacks Read More
-
Finally Finding the ‘Unknown Unknowns’ Across Your Entire Attack Surface
PRIVACY PRIVACY CISOs dread the “unknown unknowns” – the assets, vulnerabilities, misconfigurations and system weaknesses that the security team hasn’t detected and thus hasn’t secured. These blind spots represent a golden opportunity for attackers – and a major security risk for organizations. “Unknown unknowns.” It’s the answer I’ve heard most consistently from CISOs and other…
-
Palo Alto adds software composition analysis to Prisma Cloud to boost open-source security
PRIVACY PRIVACY Palo Alto Networks has added a new software composition analysis (SCA) solution to Prisma Cloud to help developers safely use open-source software components. The vendor has also introduced a software bill of materials (SBOM) for developers to maintain and reference a codebase inventory of application components used across cloud environments. The updates come…
-
Security Best Practices: Cybersecurity & Compliance at Scale
PRIVACY PRIVACY Organizations can use security best practices to achieve compliance, ensure the protection of data assets, and scale their cybersecurity efforts.[…] Read More
-
Credit Card Fraud That Bypasses 2FA
PRIVACY PRIVACY Someone in the UK is stealing smartphones and credit cards from people who have stored them in gym lockers, and is using the two items in combination to commit fraud: Phones, of course, can be made inaccessible with the use of passwords and face or fingerprint unlocking. And bank cards can be stopped.…