Securing APIs requires both a "shift left" methodology and "shield right" action.
Read moreWhat the Conti Ransomware Group Data Leak Tells Us
March 24 2022Knowing the inner workings of Conti will not only help ransomware negotiators but also help organizations to better handle a ransomware attack when it happens.
Read moreWhat the Conti Ransomware Group Data Leak Tells Us
March 24 2022Knowing the inner workings of Conti will not only help ransomware negotiators but also help organizations to better handle a ransomware attack when it happens.
Read moreLatest episode - listen now!
Read moreLinux Improves Its Random Number Generator
March 24 2022In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security...
Read moreA Closer Look at the LAPSUS$ Data Extortion Group
March 23 2022Microsoft and identity management platform Okta both disclosed this week breaches involving LAPSUS$, a relatively new cybercrime group that specializes in stealing data from big companies and threatening to...
Read moreA Closer Look at the LAPSUS$ Data Extortion Group
March 23 2022Microsoft and identity management platform Okta both disclosed this week breaches involving LAPSUS$, a relatively new cybercrime group that specializes in stealing data from big companies and threatening to...
Read moreThe Internet Crime Complaint Center fielded 847,376 cybercrime reports last year, an increase of 7% from 2020.
Read moreOkta Says 366 Customers Impacted via Third-Party Breach
March 23 2022Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.
Read moreOkta Says 366 Customers Impacted via Third-Party Breach
March 23 2022Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.
Read more
Recent Comments