breaches
Twitter Hack—Old Dog, New Tricks
Atif Mushtaq | | bitcoin transfer scams, breaches, Mobile Phishing Protection, Mobile Security, Phishing, phishing authority, real time phishing, social engineering, twitter hack
The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of phishing sites each day because cybercriminals see it as an easy way to ...
Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable
Jimmy Lin | SlashNext Phishing Research Lab | | bec, breaches, Phishing, social engineering, Uncategorized
Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an email account belonging to someone else. Cybercriminals obtain stolen user credentials through trade or purchase on the ...
Billions of Leaked Credentials Available on the Dark Web
Researchers have found over 15 billion credentials from more than 100,000 data breaches on the dark web, including access to everything from streaming services to banking accounts and financial services. Despite what ...
Theft of CIA’s "Vault Seven" Hacking Tools Due to Its Own Lousy Security
The Washington Post is reporting on an internal CIA report about its "Vault 7" security breach: The breach -- allegedly committed by a CIA employee -- was discovered a year after it ...
Bitglass Security Spotlight: Wishbone App Breached, Affecting More Than 40 Million Users
Juan Lugo | | aws, Breach, breaches, CASB, Cloud Data Protection, Cloud Security, data leakage, government, Malware, Next Gen CASB
Here are the top stories of recent weeks: Over 40 Million Users Affected in Wishbone App Breach 25 Million College Students Are the Victims of Mathway Breach Airline Data Breach Results in ...
Password Changing After a Breach
This study shows that most people don't change their passwords after a breach, and if they do they change it to a weaker password. Abstract: To protect against misuse of passwords compromised ...
What You Need to Know About Reverse Proxy
Jacob Serpa | | bitglass, breaches, CASB, CCPA, Cloud Adoption, Cloud Data Protection, Cloud Security, Compliance, data leakage, GDPR, working remotely
Cloud access security brokers (CASBs) are the go-to solutions for securing the use of cloud-based tools. Whether it’s major software-as-a-service apps, niche or long-tail SaaS apps, custom apps built on IaaS platforms, ...
Bitglass and CrowdStrike for Agentless ATP in the Cloud
Staunton Sample | | Apptega, bitglass, breaches, CASB, CCPA, Cloud Adoption, Cloud Data Protection, Cloud Security, Compliance, CrowdStrike, data leakage, GDPR
With an ever changing, and increasingly more perilous, threat landscape, real-time data protection has become an imperative. Malware, specifically, presents a unique hazard to SaaS data, as malicious programs rapidly change with ...
Securing Remote Work Part 4: ZTNA
Kevin Sheu | | "Zero Trust Remote Work", bitglass, breaches, CASB, CCPA, Cloud Adoption, Cloud Data Protection, Cloud Security, data leakage, GDPR, ZTNA
My colleagues Wayne Phillips and Jonathan Andresen recently delivered a webcast titled, “Who moved my VPN and why should I care?” It covers a host of topics related to securing today’s remote ...
Bitglass Security Spotlight: Pharmaceutical Giant Is the Latest Victim of Ransomware Attack
Juan Lugo | | Breach, breaches, CASB, Cloud Security, COVID-19, data leakage, government, Malware, Ransomware
Here are the top stories of recent weeks: Ransomware Attack Results in Pharmaceutical Data Leak Chegg Suffers Breach for the Third Time Since 2018 Fitness App Exposes Over 42 Million User Records ...

