Threats & Breaches
BlackCloak Warns That InfraGard Data Leak is Still “Alive and Well” on the Dark Web – and Free For Anyone to Access
More than three months after a hacker known as “USDoD” successfully breached the FBI’s InfraGard database in December 2022, the personal information of over 87,000 InfraGard members remains in active circulation on ...
Top Data Breaches in 2022 and 2023 Point to Increases in Phishing and Ransomware
The hits just keep on coming in the world of headline-grabbing data breaches. Threat actors kept busy in 2022 and right on into the new year, with several notable data breaches already ...
Ransomware Protection Cost Analysis: How Much Will Security Cost?
Ransomware attacks are expensive. But are they more expensive than ransomware protection? To protect against ransomware, you’ll need a slew of tools, processes, practices, and training. All of that takes time, money, ...
What Will it Take to Establish a Ground Truth for SBOMs?
A Software Bill of Materials – also known as an SBOM – has emerged as another effective tool in the arsenal as organizations look to secure their supply chains. But there is ...
Google Suspends Chinese E-Commerce App Pinduoduo Over Malware
Google says it has suspended the app for the Chinese e-commerce giant Pinduoduo after malware was found in versions of the app. The move comes just weeks after Chinese security researchers published ...
Elevate Cybersecurity Resilience With PCI-DSS 4.0
Earlier this year, the PCI Security Standards Council revealed version 4.0 of their payment card industry data security standard (PCI-DSS). While organizations won’t need to be fully compliant with 4.0 until March ...
Weak Passwords Offer Easy Access to Enterprise Networks
Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...
What’s in an SBOM?
More and more organizations are deploying a software bill of materials (SBOM) to identify and track the various components of the software products they develop or use. The goals of using SBOM ...
Cybersecurity Leaders Stressed Over Email Security
Email is the most relied-on means of communication for businesses, but it also poses a significant risk due to the combined threats of inbound phishing attacks, human error and data exfiltration leading ...
Investing in People Doesn’t Take AI
Investing in People Doesn’t Take AIAI is not an investment; ask any bank.Decisions made by people powered by artificial intelligence should keep the accountability and responsibility of the organization the same. Now ...