Data Security
Avoid The Hack: 7 Best Private Search Engine Recommendations
This post was originally published on 27 APR 2021; it has since been updated and revised. Are you using Google, Bing, or Yandex? Tired of "biased" search results? Tired of seeing re-targeting ...
Fighting Back Against Synthetic Identity Fraud
In today’s digital-first world, synthetic identity fraud is becoming more prevalent and pervasive ...
APT Group Earth Estries Runs Espionage Campaigns Against US, Others
A newly discovered cyber-espionage threat group for at least three years has been using advanced and novel tools to steal information from governments and tech companies in half a dozen countries, including ...
BadBazaar: Chinese Spyware Shams Signal, Telegram Apps
After sneaking into Google and Samsung app stores, “GREF” APT targets Uyghurs and other PRC minorities ...
What is Web Application Security Testing?
Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These ...
Breaches Galore Means it’s Time for Data-Centric Security
It’s no secret that organizations around the world are struggling to keep their most prized assets under lock and key. One report claims2022 was a near-record year in the US for data ...
From Simple Beginnings, ‘Classiscam’ Fraud Campaigns Go Global
Cybersecurity firm Group-IB in 2019 uncovered a Russia-based scam-as-a-service that used fake classified ads and social engineering methods to convince people to buy goods or services that didn’t actually exist and by ...
Millions affected by Duolingo, Mom’s Meals data breaches
As the months roll on in 2023, so too do the data breaches. Millions of people are affected by data breaches against all sorts of different services and entities, and the data ...
LockBit Builder Leak Leads to Flood of Ransomware Variants
The leak 11 months ago of the builder for the LockBit 3.0 ransomware opened the door for any threat actor to create their own customized versions of the malware and they took ...