SBN News
GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams
Americans lost a record $10 billion to scams last year — and scams are getting more sophisticated. Related: Google battles AI fakers Recently used to impersonate Joe Biden and Taylor Swift, AI voice cloning ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
Tom Eston | | account hacking, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, google, hacked, Hacking, Information Security, Infosec, Instagram, Malware, Meeting Invite, Meta, Microsoft Teams, online, Podcast, Podcasts, Privacy, rat, RATs, remote-access Trojan, security, social media, Spoofed Online Meetings, spoofing, Teams, technology, Weekly Edition, Zoom
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
What are SBOM standards and formats?
The growing importance of software bills of materials (SBOMs) marks a significant shift towards better transparency and security in software management ...
News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software
San Francisco, Calif., Mar. 7, 2024 — Badge Inc., the award-winning privacy company enabling Identity without Secrets™, today launched a new Partner Program and welcomed Identity Data Management and Analytics provider Radiant Logic ...
Women in cybersecurity: On the shoulders of giants
$11.5 trillion - the Gross Domestic Product (GDP) of the world's third-largest economy after the United States and China. However, this is not a country. It's the estimated cost of cybercrime to ...
Russian Hackers Target Ukraine Via A Disinformation Campaign
Wajahat Raja | | Alexei Navalny, Callisto Group, COLDRIVER, credential harvesting, cyber warfare, Cybersecurity Measures, Cybersecurity News, disinformation campaign, ESET, Kyivstar, Microsoft, Operation Texonto, phishing campaign, Russian hackers, The Hacker News, The Record, Ukraine, Vladimir Putin
Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
Browserless Entra Device Code Flow
Zugspitze, Bavaria, Germany. Photo by Andrew ChilesDid you know that it is possible to perform every step in Entra’s OAuth 2.0 Device Code flow — including the user authentication steps — without a browser?Why that matters:Automating authentication flows enables ...
Pathlock Announces Release of First-of-its-Kind SAP Cybersecurity Product
Pathlock is pleased to announce the launch and general availability of its Cybersecurity Application Controls (CAC), the first-ever SAP cybersecurity product designed to safeguard business data from breaches and exploitation. This innovative ...
Embracing the AI revolution: Navigating the impact on developers
Aaron Linskens | | Artificial Intelligence, dependencies, News and Views, Report/Survey/Whitepaper releases, software supply chain
In the wake of transformative advancements in generative artificial intelligence (AI) and machine learning (ML), the landscape of software development is undergoing a significant shift ...
GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors
Charities and nonprofits are particularly vulnerable to cybersecurity threats, primarily because they maintain personal and financial data, which are highly valuable to criminals. Related: Hackers target UK charities Here are six tips ...