Threats & Breaches
How a Security Data Fabric Approach Can Transform the GRC Function
Creating a security data fabric protects an organization’s investment in its security and other IT controls by identifying performance issues so they can be fixed ...
Vulnerability Management Lifecycle in DevSecOps
In this new series, CJ May shares his expertise in implementing secure-by-design software processes that empower engineering teams. The first stage of his DevSecOps program: vulnerability management ...
Revealed: Facebook’s “Incredibly Aggressive” Alleged Theft of Snapchat App Data
Meta MITM IAAP SSL bump: Zuck ordered “Project Ghostbusters”—with criminal consequences, says class action lawsuit ...
Securing the Future: Navigating the Complexities of Cloud Security
Cloud environments are complex, and can create a difficult territory for security and IT teams to monitor and comprehend ...
CISA, FBI Push Software Developers to Eliminate SQL Injection Flaws
The federal government is putting pressure on software makers to ensure that their products don’t include SQL injection vulnerabilities, a longtime and ongoing threat that was put in the spotlight with last ...
Security Vulnerability in Saflok’s RFID-Based Keycard Locks
It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...
Telegram Privacy Nightmare: Don’t Opt In to P2PL
Scary SMS shenanigans: Avoid Telegram’s new “Peer-To-Peer Login” program if you value your privacy or your cellular service ...
US, UK Accuse China of Years-Long Cyberespionage Campaign
The United States, the UK, and other countries this week accused a state-sponsored Chinese threat group of running a massive global hacking campaign for more than a decade that targeted political figures, ...
How Malware Facilitates Online Financial Fraud and Threatens Corporate Security
Malware stands as a formidable tool in the arsenal of cybercriminals, facilitating online financial fraud with alarming efficiency and sophistication. This malicious software, designed to damage or disable computers, now targets the ...
ChatGPT Plugin Security Vulnerabilities Exploited By Hackers
In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...