Data Privacy Alert: Toyota Apologizes for Prolonged Data Leakage Due to Cloud Misconfiguration

Introduction: The automotive industry has witnessed a significant shift towards utilizing cloud technologies and collecting data from vehicles. This data collection serves several crucial purposes, including enhancing vehicle performance, improving safety features, ...
JavaScript: A Taxing Situation

JavaScript: A Taxing Situation

An authorized IRS eFile website is the latest victim of a JavaScript attack. eFile.com has become the victim of an attack which originated in a previously innocent JavaScript file. The javascript file, ...

Digital Skimming Attacks Skyrocket

Beware of digital skimming attacks! According to Visa's Spring 2023 Biannual Threats Report, digital skimming attacks targeting customer data on eCommerce checkout pages increased by 174% in the last half of 2022 ...

Fullz and Cybercrime: Why the BidenCash Data Dump Matters

BidenCash, which purposely leverages the namesake of U.S. President Joe Biden, has been operating for the past year and has become one of the top carding marketplaces on the dark web. But ...
Canada’s Largest Alcohol Retailer Hit by Magecart Attack

Canada’s Largest Alcohol Retailer Hit by Magecart Attack

The Liquor Control Board of Ontario (LCBO), Canada’s largest alcoholic beverage retailer, revealed last week that hackers had injected malicious code into its website to steal customer and credit card data. This ...

Your Digital User Experience is Great. But Could it Cost You Millions? 

The shift online, with all of its benefits to businesses and consumers, also introduces serious risks to your business. As someone involved in the business side of digital, you need to understand ...
Back view of businessman with suitcase in hands looking at virtual panel

Bitglass Where’s Your Data Experiment 2021: Why You Should Care Where Your Data is Going

In 2015 several things happened in the tech world that significantly impacted our lives today, such as Google making their powerful artificial intelligence technology (TensorFlow) open source, the start of the media ...
Malicious Life Podcast: Smart TVs - a New Security Battlefield

Malicious Life Podcast: Smart TVs – a New Security Battlefield

Smart Homes are slowly but surely becoming a part of our everyday lives, and so far it seems that Smart TVs - equipped with microphones, cameras, and an internet connection - are ...
Hand presenting against serene landscape with city on the horizon at night

Why the World Needs Proactive Cybersecurity

Computing is now in a ubiquitous state with users able to connect to a dizzying number of services and applications. Companies have networked together everything to reduce costs, increase automation, and achieve ...
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Attackers Leverage Microsoft Vulnerabilities and More Ransomware Updates

Here are the top security stories from recent weeks:  Microsoft Exchange Servers Getting Attacked by ProxyShell Exploits Ransomware Gangs Using Windows PrintNightmare Vulnerabilities in Attacks Accenture Hit by Ransomware Attack, Data Stolen ...