David Bisson, Hacker Noon

David Bisson

Hacker Noon

Contact David

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Hacker Noon
  • The New Stack
  • DevOps.com
  • Tripwire, Inc.
  • Graham Cluley

Past articles by David:

How Automation Factors into Credential Stuffing

Notwithstanding the prevalence of password reuse and stolen credentials, digital attackers can’t make credential stuffing work without some degree of automation → Read More

Beyond API Security Testing: Runtime Protection

The problem with API security testing is that it’s effective in identifying only some API security issues. That’s why Salt Security feels that organizations need to do more: with runtime protection. → Read More

Best Practices for Securely Setting up a Kubernetes Cluster

Securely setting up a cluster is just one element that people can learn by becoming a Certified Kubernetes Security Specialist (CKS). CKS certification attests to an individual’s knowledge about cluster hardening, system hardening and Kubernetes supply chain security, among other topics. → Read More

How to Foster Collaboration Between DevOps and Security

DevOps is on the rise. Back in 2018, MarketsandMarkets wrote that it expected the DevOps market to grow to $10.31 billion by 2023. That’s up from $2.90 → Read More

The Importance of Digital Certificates to DevOps Teams

Certificate management is an important element of ensuring DevOps processes run smoothly Organizations are increasingly integrating DevOps into their app → Read More

Build, Deploy, Runtime: The 3 Stages of Kubernetes Security –

Security is and needs to continue to be a priority for organizations seeking to deploy containers and Kubernetes applications into production. → Read More

VelvetSweatshop Technique Used by Attack Campaign to Deliver LimeRAT

An attack campaign leveraged the Excel VelvetSweatshop encryption technique to deliver samples of the LimeRAT malware family. → Read More

Tupperware Website Compromised with Credit Card Skimmer

Digital attackers compromised the website of kitchen and household products manufacturer Tupperware with a credit card skimmer. → Read More

Industrial Entities in Middle East Targeted by WildPressure APT Operation

A newly detected advanced persistent threat (APT) operation called "WildPressure" targeted industrial organizations and other entities in the Middle East. → Read More

Food Delivery Website in Germany Targeted by DDoS Attackers

Malicious individuals targeted a food delivery website located in Germany with a distributed denial-of-service (DDoS) attack. → Read More

Nefilim Ransomware Threatens to Release Victims' Data within a Week

A newly discovered ransomware family called "Nefilim" told its victims that it would publish their stolen data within a week unless they paid their ransom. → Read More

Spam Campaign Leverages IQY Files to Distribute Paradise Ransomware

Security researchers detected a spam campaign leveraging Internet Query (IQY) files in an attempt to distribute Paradise ransomware. → Read More

Chatbot Used by Phishing Scammers to Help Victims Provide Their Data

Digital fraudsters incorporated a chatbot into their phishing scam for the purpose of helping victims hand over their personal information. → Read More

Facebook Sued by OAIC for Allegedly Violating 300K Aussies' Privacy

The Office of Australian Information Commissioner (OAIC) filed a lawsuit alleging that Facebook violated the privacy of over 300,000 Australian citizens. → Read More

Expired Certificates Used as Disguise to Spread Buerak, Mokes Malware

Researchers observed digital attackers employing expired security certificates as a disguise to distribute the Buerak downloader and Mokes malware. → Read More

T-Mobile Says Security Incident Might Have Exposed Customers' Data

Mobile telecommunications company T-Mobile disclosed a data security incident that might have exposed the account information of some of its customers. → Read More

Let's Encrypt Says It Will Revoke 3M Certificates Due to Software Bug

Non-profit certificate authority (CA) Let's Encrypt announced it will revoke more than three million digital certificates due to a software bug. → Read More

PwndLocker Ransomware Targeting Municipalities, Enterprise Networks

Security researchers discovered a new ransomware family called "PwndLocker" targeting municipalities and enterprise networks. → Read More

Walgreens Disclosed Data Security Incident Involving Its Mobile App

Pharmacy store chain operator Walgreens notified some of its customers of a data security incident involving its mobile app. → Read More

More Than 140GB of Data Exposed by Israeli Marketing Company

An Israeli marketing company exposed more than 140GB of data by mishandling the credentials for an Elasticsearch database. → Read More