Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Notwithstanding the prevalence of password reuse and stolen credentials, digital attackers can’t make credential stuffing work without some degree of automation → Read More
The problem with API security testing is that it’s effective in identifying only some API security issues. That’s why Salt Security feels that organizations need to do more: with runtime protection. → Read More
Securely setting up a cluster is just one element that people can learn by becoming a Certified Kubernetes Security Specialist (CKS). CKS certification attests to an individual’s knowledge about cluster hardening, system hardening and Kubernetes supply chain security, among other topics. → Read More
DevOps is on the rise. Back in 2018, MarketsandMarkets wrote that it expected the DevOps market to grow to $10.31 billion by 2023. That’s up from $2.90 → Read More
Certificate management is an important element of ensuring DevOps processes run smoothly Organizations are increasingly integrating DevOps into their app → Read More
Security is and needs to continue to be a priority for organizations seeking to deploy containers and Kubernetes applications into production. → Read More
An attack campaign leveraged the Excel VelvetSweatshop encryption technique to deliver samples of the LimeRAT malware family. → Read More
Digital attackers compromised the website of kitchen and household products manufacturer Tupperware with a credit card skimmer. → Read More
A newly detected advanced persistent threat (APT) operation called "WildPressure" targeted industrial organizations and other entities in the Middle East. → Read More
Malicious individuals targeted a food delivery website located in Germany with a distributed denial-of-service (DDoS) attack. → Read More
A newly discovered ransomware family called "Nefilim" told its victims that it would publish their stolen data within a week unless they paid their ransom. → Read More
Security researchers detected a spam campaign leveraging Internet Query (IQY) files in an attempt to distribute Paradise ransomware. → Read More
Digital fraudsters incorporated a chatbot into their phishing scam for the purpose of helping victims hand over their personal information. → Read More
The Office of Australian Information Commissioner (OAIC) filed a lawsuit alleging that Facebook violated the privacy of over 300,000 Australian citizens. → Read More
Researchers observed digital attackers employing expired security certificates as a disguise to distribute the Buerak downloader and Mokes malware. → Read More
Mobile telecommunications company T-Mobile disclosed a data security incident that might have exposed the account information of some of its customers. → Read More
Non-profit certificate authority (CA) Let's Encrypt announced it will revoke more than three million digital certificates due to a software bug. → Read More
Security researchers discovered a new ransomware family called "PwndLocker" targeting municipalities and enterprise networks. → Read More
Pharmacy store chain operator Walgreens notified some of its customers of a data security incident involving its mobile app. → Read More
An Israeli marketing company exposed more than 140GB of data by mishandling the credentials for an Elasticsearch database. → Read More