Data breach

Securing Sensitive Data: Cybersecurity in Asset Management
The asset management sector, a critical component of the financial industry, is facing a pressing challenge in the form of cybersecurity. During the first quarter of 2023, the number of weekly cyberattacks ...
3 Phishing Education Tips for Banks to Prevent Data Breaches
Despite several technological advances, phishing continues to occupy top spots in lists of the most prolific cybersecurity risks. Recent research shows that phishing caused losses of $52 million in the United States ...

An Analysis: 3 Breaches and the Role of Cloud Permissions
Good security has long been about creating a barrier to entry. It’s been about ‘keeping them out.’ The spotlight, attention, and budget, has been dedicated to that pivotal moment – whether the ...

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a ...

Caesars Bungling Notice of Data Breach
Caesars Rewards Members are receiving notice of the data breach that occurred more than a month prior. The breach occurred in August 2023, but Caesars did not report it to regulatory officials ...

Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale
In milestone episode 300, Jayson E. Street (a renowned hacker, helper, and human who has successfully robbed banks, hotels, government facilities, and Biochemical companies on five continents) joins us to share what ...

SEC is Investigating Progress Software in Wake of MOVEit Attacks
Progress Software is now adding an investigation by the U.S. Securities and Exchange Commission to its growing list of legal and financial headaches stemming from the massive hack of its MOVEit file ...

Best Practices for Cloud Application Security Testing
Ensuring robust cloud application security within a cloud environment is a vital component of any cloud ecosystem. It empowers businesses to enhance their agility while mitigating potential security risks. Essential cloud application ...

Why Are APIs so Easy for Threat Actors to Exploit?
Lax API security creates the perfect window of opportunity, often with a low barrier to entry. Cybercriminals are eager to exploit it ...

AI More Helpful Than Harmful in Cybersecurity
The majority of of IT security managers see the use of AI in security tools as helpful rather than a threat they must defend against ...