April 18, 2019 Attackers Compromise Admin Account to Infect Manufacturing Company With BitPaymer Ransomware 2 min read - Threat actors compromised an account with administrator privileges to infect a manufacturing company with BitPaymer ransomware.
Identity & Access April 11, 2019 Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security 6 min read - Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.
Cloud Security April 8, 2019 Why Encryption Is the Cornerstone of Your Cloud Security 6 min read - When evaluating cloud providers, it's important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes.
March 27, 2019 Data Leak Involving Family Tracking App Exposed 238,000 Users’ Real-Time Locations for Weeks 2 min read - A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.
March 25, 2019 Personal Health Details of More Than 350,000 Oregonians Potentially Exposed in HIPAA Breach 2 min read - Unauthorized individuals compromised and potentially exposed more than 350,000 Oregonians' protected health information (PHI) in a HIPAA breach.
March 13, 2019 Threat Actor Targets Japanese Users With New Ursnif Variant 2 min read - Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.
March 11, 2019 More Than 2 Billion Unencrypted Records Exposed in Major Email Leak 2 min read - A recent security incident that began as an email leak exposed more than 2 billion records containing email addresses and other personal information.
Application Security March 5, 2019 Blockchain: Making the Reward Much Greater Than the Risk 5 min read - The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
February 20, 2019 Threat Actors Impersonate Oil and Gas Companies in Latest Shade Ransomware Attack 2 min read - Digital criminals tried to impersonate oil and gas companies in a recent attack campaign distributing Shade ransomware.
Data Protection February 19, 2019 Lessons from the Encryption Front Line: Core Components in the Cloud 3 min read - Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.