News

  • Defense in depth explained: Layering tools and processes for better security

    PRIVACY PRIVACY What is defense in depth? Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold. Rather than, say, relying solely on a firewall to keep hackers out of a corporate network, an organization would…

    Read More

  • European Police Arrest 100 Suspects in BEC Crackdown

    PRIVACY PRIVACY Invoice fraud ring targeted state-owned organizations Read More

    Read More

  • India’s cybersecurity skills shortage: Airtel Payments Bank’s CISO proposes a path forward

    PRIVACY PRIVACY Manish Pandey, CISO of Airtel Payments Bank, has worked in several industries, including e-commerce, academics and fast-moving consumer goods ITeS, and banking. So he has seen first-hand the challenges of the cybersecurity skills gap in multiple contexts. Pandey started his professional journey in cybersecurity with the Indian Computer Emergency Response Team, the government’s…

    Read More

  • Smashing Security podcast #285: Uber’s hidden hack, tips for travel, and AI accent fixes

    PRIVACY PRIVACY Uber may not face prosecution over its handling of a 2016 data breach – but its former chief security head does; how to defend your digital devices’ data while on vacation, and how to change your accent with artificial intelligence. All this and much much more is discussed in the latest edition of…

    Read More

  • Uber’s former head of security faces fraud charges after allegedly covering up data breach

    PRIVACY PRIVACY The former Chief Security Officer of Uber is facing wire fraud charges over allegations that he covered up a data breach that saw hackers steal the records of 57 million passengers and drivers. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Why Whole-of-State Cybersecurity Is the Way Forward

    PRIVACY PRIVACY The ransomware threat confronting SLTT government organizations have led some to advocate for a whole-of-state cybersecurity approach. Read More

    Read More

  • Cyber-Criminal Offers 5.4m Twitter Users’ Data

    PRIVACY PRIVACY The seller advertised the data on the Breached Forums site and demanded at least $30,000 for it Read More

    Read More

  • Senators Introduce Quantum Encryption Preparedness Law

    PRIVACY PRIVACY Lawmakers introduced the bill because they’re worried about the potential for quantum computers to easily crack current cryptographic algorithms Read More

    Read More

  • Criminals Use Malware as Messaging Bots to Steal Data

    PRIVACY PRIVACY Cyber-criminals are using the Telegram and Discord messaging apps as command and control mechanisms Read More

    Read More

  • Teleport features passwordless access with new access plane update

    PRIVACY PRIVACY Teleport, an open source platform designed to provide zero trust access management applications, has announced the latest version of its unified access plane, Teleport 10, which features passwordless access as a single sign-on (SSO) infrastructure access solution. Teleport’s unified access plane is an open source identity-based infrastructure access platform that unifies secure access…

    Read More

News, Advisories and much more

Exit mobile version