file sharing

Eureka Security Extends DSPM Reach to File Sharing Services
Michael Vizard | | Cloud Security, Data Security, DSPM, Eureka Security, file sharing, posture management
Eureka Security extended the reach of its DSPM platform to protect documents such as spreadsheets stored in file-sharing services ...
Security Boulevard

Box Shield Embeds Security Controls in Document Service
Box Inc. today moved to secure the content flowing through its namesake document sharing and management platform by making available Box Shield, a set of threat detection and governance controls that can ...
Security Boulevard

Yikes! WeTransfer sends users’ files to the wrong people, says it doesn’t know what happened
In the most embarrassing security incident so far in 2019, file sharing service WeTransfer has sent users’ files to the wrong inboxes for at least a full day last week. Worse still, ...

Best of 2018: Microsoft OneDrive: The Good, the Bad, and the Ugly
As we close out 2018, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the second in our weeklong series of the Best of ...
Security Boulevard

Inner Circle Podcast Episode 015 – Dr. Galina Datskovsky Talks about Secure Messaging
Tony Bradley | | Data Loss Protection, data protection, email encryption, encryption, file sharing, Podcasts, secure messaging
Dr. Galina Datskovsky–an expert in the fields of compliance and information governance, and CEO of Vaporstream–joins me to talk about secure messaging. More specifically, we discuss the fixation on encryption and the ...

Attackers Inject Persistent Cryptomining in Browsers
Lucian Constantin | | Advanced Recording Format, browser abuse, Cisco WebEx, cryptomining, drive-by attack, file sharing, JavaScript mining, macOS High Sierra, malvertizing, Monero, pop-under, Remote Code Execution, root access, vulnerability, WebEx Network Recording Player, WebEx Recording Format
Attackers have found a new technique to make cryptocurrency mining, or cryptomining, inside browsers persistent, or at least survive normal attempts of closing the browser window. Drive-by cryptomining has become widespread in ...