Head off account takeover attacks by being proactive about IoT security. Start with designing and building better security protocols into IoT devices, always change weak default configurations, and regularly...
Read moreReal-World Steganography
January 20 2023From an article about Zheng Xiaoqing, an American convicted of spying for China: According to a Department of Justice (DOJ) indictment, the US citizen hid confidential files stolen from his...
Read moreNew T-Mobile Breach Affects 37 Million Accounts
January 20 2023T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile...
Read morePayPal Breach Exposed PII of Nearly 35K Accounts
January 20 2023The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.
Read moreEmojiDeploy Attack Chain Targets Misconfigured Azure Service
January 20 2023Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.
Read moreMassive Adware Campaign Shuttered
January 20 2023Mainly Apple iOS in-app ads were targeted, injecting malicious JavaScript code to rack up phony views.
Read moreAttackers Crafted Custom Malware for Fortinet Zero-Day
January 20 2023The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.
Read moreShift Identity Left: Preventing Identity-Based Breaches
January 20 2023Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
Read moreName That Toon: Poker Hand
January 20 2023Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments