January 31, 2022
Via: Federal News NetworkThe prosecutor who’s investigating whether Donald Trump and others broke the law by trying to pressure Georgia officials to overturn Joe Biden’s presidential election victory is asking the FBI for security help after the former president railed against prosecutors investigating […]
December 14, 2021
Via: ArsTechnicaHackers including Chinese state-backed groups have launched more than 840,000 attacks on companies globally since last Friday, according to researchers, through a previously unnoticed vulnerability in a widely used piece of open-source software called Log4J. Cyber security group Check Point […]
Cybersecurity, Networking & Wireless, Tech
August 17, 2021
Via: Tech CrunchT-Mobile has confirmed “unauthorized access” to its systems, days after a portion of customer data was listed for sale on a known cybercriminal forum. The U.S. cell giant, which last year completed a $26 billion merger with Sprint, confirmed an […]
August 2, 2021
Via: Tech CrunchZoom has agreed to pay $85 million to settle a lawsuit that accused the video conferencing giant of violating users’ privacy by sharing their data with third parties without permission and enabling “Zoombombing” incidents. Zoombombing, a term coined by TechCrunch […]
July 8, 2021
Via: CSO OnlineAs organizations embrace cloud computing, the rate of infrastructure-as-code (IaC) adoption continues to rise. As with many new technologies, security is often bolted onto IaC or forgotten entirely. Securing IaC is important. Here’s how to best do so and the […]
July 8, 2021
Via: CSO OnlineIf you want to know what’s new in cybersecurity, watch what the startup vendors are doing. They typically begin with an innovative idea and are unfettered by an installed base and its mainstream approach. Startups often tackle problems no one […]
May 14, 2021
Via: InfoWorld allThe cloud is typically a destination for systems needing to be modernized to take advantage of technologies such as AI, predictive analytics, or a hundred other cloud services. It’s typically cheaper, it can be allocated and changed in minutes, and […]
May 13, 2021
Via: Tech CrunchAn activist short seller has written a letter to the chief executive of insurance giant Lemonade with details of an “accidentally discovered” security flaw that exposes customers’ account data. Carson Block, founder of investment research firm Muddy Waters Research, sent […]
May 5, 2021
Via: Tech CrunchEach of the big cloud platforms has its own methodology for passing on security information to logging and security platforms, leaving it to the vendors to find proprietary ways to translate that into a format that works for their tool. […]
April 30, 2021
Via: Threat PostSecurity researchers at Microsoft are warning the industry about 25 as-yet undocumented critical memory-allocation vulnerabilities across a number of vendors’ IoT and industrial devices that threat actors could exploit to execute malicious code across a network or cause an entire […]