-
FlexBooker Data Leak Impacts Millions of End Customers
Researchers find misconfigured AWS S3 bucket Read More
-
Data Privacy Lawsuit Could Cost Meta $90m
Facebook parent agrees to pay $90M to settle decade-old data privacy lawsuit Read More
-
Fertility Clinic Hit with Ransomware
Ransomware attack on NYC fertility clinic leads to breach of patients’ personal data Read More
-
U.S. government warns that sensitive data is being stolen from defence contractors
The Federal Bureau of Investigation (FBI), Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) have joined forces to publish a joint warning that Russian hackers have targeted defence contractors to steal sensitive data. Read more in my article on the Tripwire State of Security blog. Read More
-
Phishing Top Threat to US Healthcare
Phishing and ransomware attacks most significant security incidents for US healthcare organizations Read More
-
Possible Government Surveillance of the Otter.ai Transcription App
A reporter interviews a Uyghur human-rights advocate, and uses the Otter.ai transcription app. The next day, I received an odd note from Otter.ai, the automated transcription app that I had used to record the interview. It read: “Hey Phelim, to help us improve your Otter’s experience, what was the purpose of this particular recording with…
-
Tenable’s Acquisition Of Cymptom: An “Attack Path-Informed” Approach to Cybersecurity
Tenable’s recent acquisitions all had the same overarching goal: helping our customers gain better security insights across their cyberattack surface. At our investor day in December 2021, Tenable CEO Amit Yoran and I outlined the vision of where we see Tenable and the vulnerability management market heading over the next few years. We focused on…
-
Social Media: How to Steer Your Family Clear of Cryptomining Malware
It’s fun to jump on our favorite social media sites such as Facebook, Instagram, or LinkedIn and know we can quickly check in with friends and family, discover interesting content, and instantly connect with colleagues worldwide. The last thing on most of our minds when tapping our way into these familiar online communities is being…
-
New quantum key distribution network resistant to quantum attacks
New research has revealed the full viability of a novel quantum key distribution (QKD) network for metropolitan areas that is resistant to quantum computing attacks. According to JPMorgan Chase, Toshiba and Ciena, the newly developed QKD network supports 800 Gbps encryption under real-world environmental conditions and can instantly detect and defend against quantum-enabled threats. In…
-
What you need to know about Log4Shell
Photo by ThisIsEngineering from Pexels Considered one of the largest exploitable vulnerabilities in history, Log4Shell affects many as Log4J is one of the most extensively used logging libraries. An issue that has existed for almost a decade but just recently was discovered, Log4Shell leaves companies vulnerable to the full extent of these attacks. AT&T Alien Labs blogged about…