The Top 3 Cyber Security Mistakes and How to Avoid Them
As hacks become more common, organizations have no room for cybersecurity mistakes. By Ivan Paynter, National Cybersecurity Specialist at ScanSource Ransomware cost Americans an estimated $1.4 billion last year, and beyond high-profile hacks…
AbstractEmu, a new Android malware with rooting capabilities
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware,…
Russia-linked Nobelium APT targets orgs in the global IT supply chain
Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May 2021. The SolarWinds security breach was not isolated, Russia-linked Nobelium APT group has…
Being Mindful of Communication Security
The potential risks of communication APIs and CPaaS and secure vendor selection criteria. By James Ryan, Director of Information Security, BISO, IntelePeer The pandemic accelerated the demand for various things,…
Twitch data breach updates: login credentials or card numbers not exposed
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent file posted on 4chan. An anonymous 4chan user has published…
Intercepting data traffic via iPhone
Intercepting data traffic via iPhone By Jordan Marcus Bonagura Introduction This article aims to demonstrate in a simplified way different approach for capturing and intercepting network traffic data originating from…
How to Close the Security Gap Between Identity and Access Management (IAM) and Shared Accounts
By Maurice Côté, Vice President of Business Solutions, Devolutions For more than half a century, passengers of London’s underground (a.k.a. The Tube) have been warned to “mind the gap” when…
Source Code Protection Market
Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are…
Threat actors exploit a flaw in Coinbase 2FA to steal user funds
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw to bypass 2FA authentication. Threat actors have exploited a vulnerability…
SQL Cyber Attacks Are a Danger to Your Company
By Ryan Ayers, Consultant Cyber attacks cost the global economy more than $1 trillion last year, making it responsible for the theft of one percent of the global GDP. The…
Russia-linked Nobelium APT group uses custom backdoor to target Windows domains
Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows domains. Microsoft Threat Intelligence Center (MSTIC) researchers have discovered a new custom…
5 Steps to Protect Your Organization from the Next Ransomware Attack
By Paul Kohler, CTO, S3 We have witnessed the largest ransomware attacks in history in the first half of 2021 alone. From SolarWinds to CNA Financial Corp, Colonial Pipeline, JBS…