Featured
Bugcrowd Report Shows Marked Increase in Crowdsourced Security
The impact of the novel coronavirus pandemic on how enterprises work—and secure their workers and data—will last for years. And while the long-term ramifications are yet to be known, a recent survey ...
The SolarWinds Supply Chain Hack: What You Need to Know
Just when you thought we had the last major hack of 2020 with the FireEye incident last week, we have discovered just a couple of days later that it stemmed from a ...
3 Million Chrome Users Infected via Extensions—Here We Go Again
28 browser extensions for Chrome and Edge were laced with malware, says an anti-virus vendor ...
Enterprises Increase Security Spending but not Efficacy
One of the constants in cybersecurity is that wherever there is a breach there is a high probability that there’s a stolen credential involved. With that perspective in mind, a recent report ...
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
AT&T Cybersecurity has published a report that suggests more IT organizations are becoming conscious of 5G security issues heading into a year when these services should be employed more widely. Based on ...
Signal App Crypto Cracked, Claims Cellebrite
The Signal app has been cracked—its encryption is broken. That’s the preposterous claim made by Cellebrite ...
Who Watches the Watchers, Italian Style – Insider IP Theft at Leonardo
Two infosec team members are accused of attacking Leonardo’s systems to perpetrate IP theft, highlighting the real issue of insider threats One question often asked in security is whether an event is ...
SUNBURST: Russia Fingered in ‘Perfect 10’ Supply Chain Attack
Russian spies have been operating inside countless enterprises and government agencies, thanks to a hack of SolarWinds ...
Assessing the New Normal for Cybersecurity
As work from home continues, cyberthreats related to the new normal will remain even post-pandemic “Pandemic” was the word of the year, with runners up including quarantine, coronavirus and asymptomatic. They make ...
Third-Party Risk Management: How to Get Your Vendors on Board
So you’ve finally stood up a proper third-party risk management (TPRM) program. You’ve got your vendors inventoried, their risks assessed and technologies selected to keep them on the straight and narrow. That ...
