Phew! An audacious crime... that didn't work out.
Read moreStolen Bitcoins Returned
December 22 2021The US has returned $154 million in bitcoins stolen by a Sony employee. However, on December 1, following an investigation in collaboration with Japanese law enforcement authorities, the FBI seized...
Read moreZero trust may be one of the hottest trends in cybersecurity, but just eliminating trust from networks isn’t enough to prevent successful organizational data breaches, says Wes Wright, CTO...
Read moreZero trust may be one of the hottest trends in cybersecurity, but just eliminating trust from networks isn’t enough to prevent successful organizational data breaches, says Wes Wright, CTO...
Read moreFuture of Identity-Based Security: All-in-One Platforms or Do-It-Yourself Solutions?
December 22 2021The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of...
Read moreUK Security Agency Shares 225M Passwords With ‘Have I Been Pwned’
December 21 2021The UK's NCA and NCCU have shared 225 million stolen emails and passwords with HIBP, which tracks stolen credentials.
Read moreMeta Files Federal Lawsuit Against Phishing Operators
December 21 2021The Facebook parent company seeks court's help in identifying the individuals behind some 39,000 websites impersonating its brands to collect login credentials.
Read moreMeta Files Federal Lawsuit Against Phishing Operators
December 21 2021The Facebook parent company seeks court's help in identifying the individuals behind some 39,000 websites impersonating its brands to collect login credentials.
Read more93% of Tested Networks Vulnerable to Breach, Pen Testers Find
December 21 2021Data from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers.
Read moreHow Modern Log Management Strengthens Enterprises’ Security Posture
December 21 2021If security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes...
Read more
Recent Comments