Instagram and Facebook parent company Meta was slapped with the fine for exposing the personal data of minors.
Read moreVulnerability Exploits, Not Phishing, Are the Top Cyberattack Vector for Initial Compromise
September 8 2022A slew of Microsoft Exchange vulnerabilities (including ProxyLogon) fueled a surge in attacks targeting software flaws in 2021, but the trend has continued this year.
Read moreThe initial access broker (IAB) for ransomware gangs known as UAC-0098 has targeted Ukrainian organizations in five separate phishing campaigns spanning April to August.
Read moreSaaS Alerts Secures $22M Investment from Insight Partners to Scale SaaS Security Monitoring and Response Platform
September 8 2022Investment to fuel growth and market presence as demand grows for SaaS' next-generation security tools for managed service providers.
Read morePentesting Evolves for the DevSecOps World
September 7 2022Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design.
Read moreHoliday Inn Owner InterContinental Has a Breach Trend
September 7 2022After a high-profile 2017 breach and a Holiday Inn ransomware hit earlier this year, IHG confirms that its booking channels and applications have been disrupted in yet another cyberattack.
Read moreFighting Ransomware Takes an Army: Our Public & Private Sector Soldiers Join Forces
September 7 2022Continued collaboration will help win the fight as cybersecurity remains a national priority. International and public-private cooperation is helping stem the damage from ransomware threats and cyberattacks.
Read moreHow Can I Protect My SaaS Apps Amid Employee Turnover?
September 7 2022A SaaS-specific security solution can help security teams make sure apps and usage are both secure, reducing the chances of a breach.
Read moreNext-Gen Linux Malware Takes Over Devices With Unique Toolset
September 7 2022The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cyptominer, and allows full remote control.
Read more
Recent Comments