APIs represent the best and worst of times - "massive amounts of business value, but massive amounts of unmitigated risk," says Richard Bird, CSO, Traceable AI. In the past year, misconfigured or error-prone APIs resulted in high-profile breaches at Twitter and T-Mobile. He sees more on the horizon.
Police in multiple European countries carried out raids against the operators and users of the Exclu encrypted chat app, arresting four dozen individuals. German authorities began investigating the app following a 2019 raid on the Cyberbunker web hosting facility.
Secureworks has axed roughly 210 employees, and CFO Paul Parrish and Chief Threat Intelligence Officer Barry Hensley are leaving their posts. Secureworks revealed plan to reduce its 2,351-person staff by approximately 9% to help balance continued growth with improved operating margins.
During the height of the coronavirus pandemic, mergers and acquisitions in the healthcare sector slumped, but they now appear to be slowly rebounding. What does this mean in terms of potential security risks that organizations undergoing consolidation face?
The aim of AI in EDR solutions is to streamline the process to ensure humans are able to consume and understand the data in order to respond well, says Serge Woon, worldwide tech sales leader and co-founder at ReaQta, part of IBM. In this roundtable preview, he explains why AI is so crucial to EDR.
Microsoft suffered its second major outage in less than two weeks, as users in North America and beyond were left unable to send, receive or search emails via Outlook.com and unable to access some additional functionality, including calendar APIs. Microsoft blamed unspecified "recent changes."
The LockBit group has gone from denying it had any involvement in the ransomware attack on Britain's Royal Mail to trying to bargain for a ransom. The ransomware group's site now lists Royal Mail as a victim and demands it pay a ransom or see stolen data get dumped.
Detecting and responding to cyberthreats is challenging for any organization, but even more so for small security teams. MDR services make threat monitoring and response attainable for any team. Adding a third-party MDR service might be the right choice for your organization.
U.S. wireless telecom UScellular, a regional carrier serving roughly 5 million customers, says a data breach at a third-party vendor resulted in a leak of 52,000 names and email addresses. The company confirmed that data from the leak is available for download on a criminal data breach forum.
An Android banking Trojan is targeting Brazilian adopters of an instant payment platform known as Pix, marking another foray by the South American country's criminal underground into digital larceny. Brazil has been a hotbed of Trojan activity perpetuated by domestic cybercriminals.
On the heels of an enforcement action last week by the Federal Trade Commission, telehealth and discount prescription drug provider GoodRx now also faces a proposed class action lawsuit over its data-sharing practices with third parties and the use of website tracking code.
Security practitioners are putting cognitive psychology and customer experience at the forefront of new product development in a push for usability, says Trusona's Kevin Goldman. Getting user experience designers familiar with products allows them to speak meaningfully with the security team.
Banks are losing hundreds of millions of dollars a year to check fraud - if not more, says David Maimon, professor of criminal justice and criminology at Georgia State University. The major hurdle facing banks is that they are not able to share information with each other about fraudulent checks.
The Italian cybersecurity agency says at least a dozen hacks against unpatched VMware ESXi servers in the country are likely tied to the BlackBasta ransomware group. Investigators say the ransomware campaign may have hit thousands of organizations worldwide since Thursday.
Holding cryptocurrencies in anything but a memory drive inside a box shielded with a Faraday cage seemed to tempt fate during 2022. And for that - apart from the outright alleged larceny behind the collapse of FTX - the cryptocurrency world can in large measure finger DeFi platforms.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.