New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.
By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection results, we could not believe it. We were facing a very counterintuitive […]
Why We Care About Cybersecurity Hygiene
By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as important as maintaining good personal hygiene habits. We must maintain high cybersecurity […]
UNC2465 cybercrime group launched a supply chain attack on CCTV vendor
UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang, tracked as […]
Manage the Cloud Permissions Gap to Achieve Zero Trust
The Cloud Permissions Gap exposes organizations to highly exploitable risk combined with the inability to implement and manage Zero Trust policies. By Raj Mallempati, CloudKnox Security COO In 2020, when […]
StayHackFree – Your Kid’s Sports Team
Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s Hockey team has better management than your Cyber Security team. Really, I […]
DoJ: Investigations into ransomware attacks must have similar priority as terrorism
The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice […]
FBI will share compromised passwords with HIBP Pwned Passwords
The FBI is going to share compromised passwords discovered during investigations with Have I Been Pwned (HIBP)’s ‘Pwned Passwords’ service. The FBI will share compromised passwords that were discovered during […]
A dozen Android apps exposed data of 100M+ users
Check Point researchers found 23 Android apps that exposed the personal data of more than 100 million users. Security researchers from Check Point have discovered 23 Android applications that exposed […]
China-linked APT uses a new backdoor in attacks at Russian defense contractor
China-linked APT group targets Russian nuclear sub designer with an undocumented backdoor A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy. […]
China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors
At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the networks of US defense contractors. According to coordinated reports published […]
How to Simplify Zero Trust Adoption
By Bhavya Pathak, Product Marketing Manager, ColorTokens Gone are the days when an organization could trust everything within the four walls of its perimeter. Cloud computing, and accelerating digital transformation […]
4 Matchmaking Tips to Find your Perfect SOC 2 Fit
Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place […]
Peer-To-Peer Cybersecurity Insights For 2021
Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month when people who work in the IT field offer predictions for the […]
CISA is warning of vulnerabilities in GE Power Management Devices
U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker to conduct multiple malicious activities on vulnerable systems. U.S. Cybersecurity […]
Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021
As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully […]
FBI warns of PYSA Ransomware attacks against Education Institutions in US and UK
The FBI has issued an alert to warn about an increase in PYSA ransomware attacks on education institutions in the US and UK. The FBI has issued Tuesday an alert […]
Cybersecurity Predictions For 2021
Preparing for the “next normal” By Topher Tebow, Cybersecurity Analyst (Malware), Acronis For cybersecurity professionals, this year began more or less like any other. Fast forward to April, and nearly […]
T-Mobile customers were hit with SIM swapping attacks
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after […]
Thousands of VMware Center servers exposed online and potentially vulnerable to CVE-2021-21972 flaw
A Chinese security researcher published a PoC code for the CVE-2021-21972 vulnerability in VMware Center, thousands of vulnerable servers are exposed online. A Chinese security researcher published the Proof-of-concept exploit code for […]
The US Government is going to respond to the SolarWinds hack very soon
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told CNN. The US will respond within weeks to the devastating SolarWinds […]
Hackers abuse Plex Media servers for DDoS amplification attacks
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from Netscout discovered DDoS-for-hire services have found a way to abuse Plex […]
E-Commerce and Lockdown: The Perfect Storm for Cyber Threats
The impact of lockdowns on cybersecurity By Aman Johal, Lawyer and Director of Your Lawyers The UK’s National Cyber Security Centre (NCSC) reported that a quarter of all cyberattacks over […]
3 Email Hacking Techniques to Watch In 2021
By Adrien Gendre, Chief Product & Services Officer, Vade Secure Ransomware hobbled businesses in 2020, while COVID-19 spawned an endless stream of cyberattacks. What both have in common is email. […]
How We Securely Share Data in A Remote World
By Duncan Greatwood, CEO, Xage Security Cybersecurity solutions are often thought of as a single-issue solution: protecting companies from dangerous or costly hacks, or detecting hacks after they’ve already happened, […]
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece, […]
Nations—Not Individuals—Are After Your IP
By Ryan Benner, Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted […]
How to Keep Your Children Safe in Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Has Your Data Been Leaked to the Dark Web?
By Randy Reiter CEO of Don’t Be Breached The part of the internet not indexed by search engines is referred to as the Dark Web. The Dark Web is however […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]