Twitter Hack—Old Dog, New Tricks

Twitter Hack—Old Dog, New Tricks

The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of phishing sites each day because cybercriminals see it as an easy way to ...
Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable

Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable

Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an email account belonging to someone else. Cybercriminals obtain stolen user credentials through trade or purchase on the ...
Billions of Leaked Credentials Available on the Dark Web

Billions of Leaked Credentials Available on the Dark Web

Researchers have found over 15 billion credentials from more than 100,000 data breaches on the dark web, including access to everything from streaming services to banking accounts and financial services. Despite what ...

Theft of CIA’s "Vault Seven" Hacking Tools Due to Its Own Lousy Security

The Washington Post is reporting on an internal CIA report about its "Vault 7" security breach: The breach -- allegedly committed by a CIA employee -- was discovered a year after it ...
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Wishbone App Breached, Affecting More Than 40 Million Users

Here are the top stories of recent weeks: Over 40 Million Users Affected in Wishbone App Breach 25 Million College Students Are the Victims of Mathway Breach Airline Data Breach Results in ...

Password Changing After a Breach

This study shows that most people don't change their passwords after a breach, and if they do they change it to a weaker password. Abstract: To protect against misuse of passwords compromised ...
top view of businessman hand working with modern technology and digital layer effect as business strategy concept

What You Need to Know About Reverse Proxy

Cloud access security brokers (CASBs) are the go-to solutions for securing the use of cloud-based tools. Whether it’s major software-as-a-service apps, niche or long-tail SaaS apps, custom apps built on IaaS platforms, ...
_CrowdStrike & Bitglass blog

Bitglass and CrowdStrike for Agentless ATP in the Cloud

With an ever changing, and increasingly more perilous, threat landscape, real-time data protection has become an imperative. Malware, specifically, presents a unique hazard to SaaS data, as malicious programs rapidly change with ...
remote-work-CTA

Securing Remote Work Part 4: ZTNA

My colleagues Wayne Phillips and Jonathan Andresen recently delivered a webcast titled, “Who moved my VPN and why should I care?” It covers a host of topics related to securing today’s remote ...
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Pharmaceutical Giant Is the Latest Victim of Ransomware Attack

Here are the top stories of recent weeks: Ransomware Attack Results in Pharmaceutical Data Leak Chegg Suffers Breach for the Third Time Since 2018 Fitness App Exposes Over 42 Million User Records ...