Experian API Leaks Most Americans’ Credit Scores
Researchers fear wider exposure, amidst a tepid response from Experian. [...]
Researchers fear wider exposure, amidst a tepid response from Experian. [...]
Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices. [...]
Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next. [...]
Sivan Tehila, cybersecurity strategist at Perimeter 81, discusses climate change and the cyber-resilience lessons companies should take away from dealing with the pandemic. [...]
The vulnerability is triggered when a cloud container pulls a malicious image from a registry. [...]
Clubhouse denies it was ‘breached’ and says the data is out there for anyone to grab. [...]
A man caught in an FBI sting allegedly said he wanted to destroy "70 percent of the internet" by going after the tech giant's data centers. [...]
Hank Schless, senior security solutions manager at Lookout, discusses how to secure remote working via mobile devices. [...]
Microsoft's cloud-container technology allows attackers to directly write to files, researchers said. [...]
One Discord network search turned up 20,000 virus results, researchers found. [...]
CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual servers and workloads that they contain. [...]
Last year Amazon Web Services (AWS) launched a new video series, AWS Verified, where we talk to global cybersecurity leaders about important issues, such as how the pandemic is impacting cloud security, how to create a culture of security, and emerging security trends. Today I’m happy to share …
Some legacy models of QNAP network attached storage devices are vulnerable to remote unauthenticated attacks because of two unpatched vulnerabilities. [...]
Publicly available cloud images are spreading Monero-mining malware to unsuspecting cloud developers. [...]
A bug-bounty program launched for the Teams desktop videoconferencing and collaboration application has big payouts for finding security holes. [...]
New research shows that while all sectors are at risk, 70 percent of manufacturing apps have vulnerabilities. [...]
TikTok’s source code is in line with industry standards, security researchers say. [...]
The arts-and-crafts retailer left 138GB of sensitive information open to the public internet. [...]
A year after COVID-19 was officially determined to be a pandemic, the methods and tactics used by cybercriminals have drastically changed. [...]
The cyberattack on SITA, a nearly ubiquitous airline service provider, has compromised frequent-flyer data across many carriers. [...]
On March 3, 2021, we launched a new feature for AWS Secrets Manager that makes it possible for you to replicate secrets across multiple AWS Regions. You can give your multi-Region applications access to replicated secrets in the required Regions and rely on Secrets Manager to keep the replicas …
Threat actors can use personal information gleaned from images to craft targeted scams, putting personal and corporate data at risk. [...]
Attackers have weaponized code dependency confusion to target internal apps at tech giants. [...]
AWS Security Hub provides a comprehensive view of your security posture in Amazon Web Services (AWS) and helps you check your environment against security standards and best practices. In this post, we’ll show you how to set up weekly email notifications using Security Hub to provide account owners …
Two breaches of the audio-based social media app reinforce privacy, security concerns. [...]