LIVE Webinar | Stop, Drop (a Table) & Roll: An SQL Highlight DiscussionPost ContentRead MoreDataBreachToday.com RSS Syndication
Day: March 3, 2023
US EPA Regulates Public Drinking Water for Cybersecurity
US EPA Regulates Public Drinking Water for CybersecurityBiden Administration Says Ransomware and Other Incidents Demand Regulatory ResponseCybersecurity will take its place alongside chemical contaminant removal as...
Zscaler Lays Off 3% of Staff Amid Delays Closing Large Deals
Zscaler Lays Off 3% of Staff Amid Delays Closing Large DealsNearly 180 Workers Exit After Vetting Around Large Deals Takes Bite Out of BillingsZscaler has axed...
US Cybersecurity Strategy Doubles Down on Hitting Ransomware
US Cybersecurity Strategy Doubles Down on Hitting RansomwarePolicy Shift Unlocks Resources to Battle Ransomware as National Security ThreatThe Biden administration, in its new national cybersecurity strategy,...
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine ProductsMultiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine...
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining MalwareTrojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS...
Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels
Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety LabelsAn investigation into data safety labels for Android apps available on the Google Play...
Supply Chain Security: What You Need to Know – Part 3: Integrity from Core to Cloud
Supply Chain Security: What You Need to Know – Part 3: Integrity from Core to CloudIn this series, we have been taking a long look at...
Acunetix releases a security check for Fortinet RCE flaw
Acunetix releases a security check for Fortinet RCE flawThis Acunetix release introduces a new security check for the Fortinet RCE flaw (CVE-2022-39952). The FortiNAC, a network...
USENIX Security ’22 – Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq – ‘Khaleesi: Breaker Of Advertising And Tracking Request Chains’
USENIX Security ’22 – Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq – ‘Khaleesi: Breaker Of Advertising And Tracking Request Chains’Our thanks to USENIX...
Attackers Don’t Hack, They Log In.
Attackers Don’t Hack, They Log In.Reading Time: 5 minutes Lessons from the LastPass Breach Below we’ll detail the latest LastPass incident, discuss the implications of this...
CISA Warns of Active Exploitation of ZK Java Framework Vulnerability
CISA Warns of Active Exploitation of ZK Java Framework VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-36537, a high-severity flaw impacting the ZK...
Ranking Cyber Risks to Healthcare Companies with Risk Quantification
Ranking Cyber Risks to Healthcare Companies with Risk Quantification It’s high stakes in the cyber risk landscape for healthcare providers, payers, medical device makers, third-party vendors,...
FireMon Cloud Defense Introduces Free Enterprise-Scale CSPM
FireMon Cloud Defense Introduces Free Enterprise-Scale CSPMFireMon is incredibly excited to introduce the industry’s first completely free unlimited CSPM for any size cloud deployments. A curated...
UnFAIR: The Limitations of FAIR’s Risk Model
UnFAIR: The Limitations of FAIR’s Risk ModelThis is blog 2 of 3 in our FAIR model series. The limitations of FAIR’s data collection process are discussed...
Threat Actors: The Definitive 2023 Guide to Cybercriminals
Threat Actors: The Definitive 2023 Guide to CybercriminalsIn a digital world, companies collect more data and more types of data than ever before. As people use...
Geopolitical Intelligence: The Definitive Guide
Geopolitical Intelligence: The Definitive GuideGeopolitics and cybersecurity for organizations of all kinds are increasingly linked. This has become increasingly clear in the past year with Russia’s...
Entitle debuts with automated SaaS permissions-management application
Entitle debuts with automated SaaS permissions-management applicationCloud-based permissions management startup Entitle debuted Wednesday with the launch of its namesake SaaS-based application, designed to automate access requests...
Dish Network Confirms Ransomware Outage
Dish Network Confirms Ransomware OutageSatellite TV provider comes clean in SEC filingRead MoreSatellite TV provider comes clean in SEC filing
Attacker Breakout Time Drops to Just 84 Minutes
Attacker Breakout Time Drops to Just 84 MinutesEvery second counts as threat actors accelerate lateral movementRead MoreEvery second counts as threat actors accelerate lateral movement
Record Number of Mobile Phishing Attacks in 2022
Record Number of Mobile Phishing Attacks in 2022Endpoint security provider Lookout released its Global State of Mobile Phishing Report, which shows an unprecedented rate of mobile...
Public SaaS Assets Are a Major Risk For Medium, Large Firms
Public SaaS Assets Are a Major Risk For Medium, Large FirmsThe findings come from DoControl’s latest SaaS Security Threat Landscape reportRead MoreThe findings come from DoControl’s...
CISA Shares Advice to Improve Networks’ Monitoring and Hardening
CISA Shares Advice to Improve Networks' Monitoring and HardeningThe recommendations stem from a red team assessment conducted in 2022Read MoreThe recommendations stem from a red team...
Google Workspace Adds Client-Side Encryption to Gmail and Calendar
Google Workspace Adds Client-Side Encryption to Gmail and CalendarThe move will facilitate compliance procedures for private and public sector organizationsRead MoreThe move will facilitate compliance procedures...
Major Phishing Campaign Targets Trezor Crypto Wallets
Major Phishing Campaign Targets Trezor Crypto WalletsUsers bombarded with fake emails, texts and callsRead MoreUsers bombarded with fake emails, texts and calls
ICO Calls for Review into Private Message Use by Ministers
ICO Calls for Review into Private Message Use by MinistersRegulator says Hancock saga highlights dangers of using WhatsAppRead MoreRegulator says Hancock saga highlights dangers of using...
Russian Government Bans Foreign Messaging Apps
Russian Government Bans Foreign Messaging AppsKremlin hunkers down as war enters its second yearRead MoreKremlin hunkers down as war enters its second year
WH Smith Discloses Cyber-Attack, Company Data Theft
WH Smith Discloses Cyber-Attack, Company Data TheftEmployee data was accessed by the threat actors, including names, addresses, and moreRead MoreEmployee data was accessed by the threat...
White House Launches National Cybersecurity Strategy
White House Launches National Cybersecurity StrategyThe Strategy provides guidelines on how companies allocate roles and responsibilities in cyber spaceRead MoreThe Strategy provides guidelines on how companies...
API Security Flaw Found in Booking.com Allowed Full Account Takeover
API Security Flaw Found in Booking.com Allowed Full Account TakeoverThe vulnerabilities could affect users logging into the site via their Facebook accountsRead MoreThe vulnerabilities could affect...