Guild Education Gives Salt an A+ for API ProtectionKeeping our customers’ data safe so that they can move forward with business innovation is our constant north...
How to Protect Your Company in a ChatGPT World
How to Protect Your Company in a ChatGPT World With the potential to be as game-changing as the internet, smartphones and cloud computing, the emergence of...
The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware
The Week in Security: YoroTrooper steals credentials in Europe, AI-created videos spread malware Welcome to the latest edition of The Week in Security, which brings...
COURT DOC: Justice Department Investigation Leads to Takedown of Darknet Cryptocurrency Mixer that Processed Over $3 Billion of Unlawful Transactions
COURT DOC: Justice Department Investigation Leads to Takedown of Darknet Cryptocurrency Mixer that Processed Over $3 Billion of Unlawful TransactionsThe Justice Department announced today a coordinated...
The Risks of Using ChatGPT to Write Client-Side Code
The Risks of Using ChatGPT to Write Client-Side CodeSince OpenAI released its AI chatbot software ChatGPT in November of 2022, people from all over the internet...
USENIX Security ’22 – Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi – ‘Batched Differentially Private Information Retrieval’
USENIX Security ’22 – Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi – ‘Batched Differentially Private Information Retrieval’Our thanks to USENIX for publishing their Presenter’s...
The Evolution of Ransomware and how to Protect Against it
The Evolution of Ransomware and how to Protect Against itRansomware is a form of malicious software that encrypts a victim’s files and requires that the data...
Breadth of Data: Why it Matters
Breadth of Data: Why it MattersThe last decade has seen tremendous growth in the availability of identity theft protection and identity monitoring services. This has been...
Botnet Protection
Botnet ProtectionFor more than a decade, Constella Intelligence–formerly 4iQ–has been hunting, collecting, and curating breach data, which powers 6 of the top 10 identity theft protection...
Russian hacktivist group targets India’s health ministry
Russian hacktivist group targets India’s health ministryA Russian hacktivist group has claimed to have breached the health management information system of India, which could contain the...
Why red team exercises for AI should be on a CISO’s radar
Why red team exercises for AI should be on a CISO's radarAI and machine learning (ML) capabilities present a huge opportunity for digital transformation but open...
When and how to report a breach to the SEC
When and how to report a breach to the SECNew cybersecurity reporting requirements for publicly traded companies are expected to be enacted in the spring of...
UK bans TikTok on government devices over data security fears
UK bans TikTok on government devices over data security fearsSocial media app TikTok has been banned on UK government electronic devices, the Cabinet Office has announced....
Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets
Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency walletsESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR...
Chinese SilkLoader Malware Sold to Russian Cyber-Criminals
Chinese SilkLoader Malware Sold to Russian Cyber-CriminalsCobalt Strike beacon loader migrates across criminal ecosystemsRead MoreCobalt Strike beacon loader migrates across criminal ecosystems
BEC Volumes Double on Phishing Surge
BEC Volumes Double on Phishing SurgeBusiness email compromise overtakes ransomwareRead MoreBusiness email compromise overtakes ransomware
NCSC Calms Fears Over ChatGPT Threat
NCSC Calms Fears Over ChatGPT ThreatTool won't democratize cybercrime, agency arguesRead MoreTool won't democratize cybercrime, agency argues
UK Joins US, Canada, Others in Banning TikTok From Government Devices
UK Joins US, Canada, Others in Banning TikTok From Government DevicesThe Chancellor of the Duchy of Lancaster, Oliver Dowden, confirmed the plans earlier todayRead MoreThe Chancellor...
ChipMixer Crypto Laundromat Shut Down By German, US Authorities
ChipMixer Crypto Laundromat Shut Down By German, US AuthoritiesThe operation seized four servers, 7TB of data and 1909.4 Bitcoins (roughly $47.3m)Read MoreThe operation seized four servers,...
US Government IIS Server Breached via Telerik Software Flaw
US Government IIS Server Breached via Telerik Software FlawThe critical vulnerability allows remote code execution and was assigned a CVSS v3.1 score of 9.8Read MoreThe critical...
CISA adds Adobe ColdFusion bug to Known Exploited Vulnerabilities Catalog
CISA adds Adobe ColdFusion bug to Known Exploited Vulnerabilities CatalogUS CISA added an actively exploited vulnerability in Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog. U.S....
Multiple threat actors exploited Progress Telerik bug to breach U.S. federal agency
Multiple threat actors exploited Progress Telerik bug to breach U.S. federal agencyMultiple threat actors exploited a critical flaw in Progress Telerik to breach an unnamed US...
Polish intelligence dismantled a network of Russian spies
Polish intelligence dismantled a network of Russian spiesPolish intelligence dismantled a cell of Russian spies that gathered info on military equipment deliveries to Ukraine via the...
CISA Warns of Adobe ColdFusion Vulnerability Exploited in the Wild
CISA Warns of Adobe ColdFusion Vulnerability Exploited in the WildOn March 15, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a new vulnerability to its...
For Sale: Data Supposedly Coming from the US Marshals Service Hack
For Sale: Data Supposedly Coming from the US Marshals Service HackThreat actors are selling what they pretend to be data stolen from U.S. Marshals Service (USMS)...
Australia’s Latitude Financial Hit by Cyberattack, Exposing 328K Client Data
Australia’s Latitude Financial Hit by Cyberattack, Exposing 328K Client DataOn Thursday, Latitude Group Holdings, an Australian company that handles digital payments and loans, revealed that a...
SASE 101: Understanding the Fundamentals of Secure Access Service Edge
SASE 101: Understanding the Fundamentals of Secure Access Service EdgeIn today’s digital age, businesses are increasingly moving their operations to the cloud. However, with this shift...
SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 Apps
SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 AppsThe cyber-research community raises concerns over a vulnerability that puts the Microsoft 365 suite at risk....
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild to Target European Government and Military
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild to Target European Government and Military Security heads-up for cyber defenders!...
Electronic data disposal policy
Electronic data disposal policyPURPOSE The purpose of this policy is to provide guidelines for the appropriate disposal of information and the destruction of electronic media, which...





























