Threats and Breaches

Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.

Human Resources Firm ComplyRight Breached

Human Resources Firm ComplyRight Breached

Cloud-based human resources company ComplyRight said this week that a security breach of its Web site may have jeopardized sensitive consumer information -- including names, addresses, phone numbers, email addresses and Social ...
Four Vulnerabilities in Cisco Policy Suite Fixed (CVE-2018-0374)

Four Vulnerabilities in Cisco Policy Suite Fixed (CVE-2018-0374)

Cisco has released more fixes for a range of critical and high severity vulnerabilities found in several groups of products – Policy Suite, SD-WAN, and Nexus. Let’s have a closer look at ...
Microsoft Starts Identity Bounty Program with Payouts up to $100,000

Microsoft Starts Identity Bounty Program with Payouts up to $100,000

Microsoft is initiating a bug bounty program that is focused on customer security. The program is called Identity Bounty Program and it will offer bounties ranging from $500 to $100,000 for unveiling ...
Exactis' Database Consumer Records

Exposed: Exactis’ Database of 340 Million Consumer Records

In late June, Exactis, a Palm Coast, Florida, company found itself at the center of seemingly every news program across the United States. The company had the indubitable honor of exposing the ...
Security Boulevard
Cyberespionage Campaign in Ukraine Uses Free and Custom RATs

Cyberespionage Campaign in Ukraine Uses Free and Custom RATs

Security researchers have been tracking a sustained cyberespionage campaign against Ukrainian government institutions that uses a combination of free and custom-made remote access Trojans (RATs). The malware programs involved in the years-long ...
Security Boulevard

Researchers Can Earn Up to $100K via Microsoft Identity Bounty Program

Microsoft announced its Identity Bounty Program through which security researchers can earn up to $100,000 for an eligible submission. On 17 July, Microsoft Security Response Center (MSRC) unveiled the creation of a ...
Long Overdue: Shedding Legacy Employee Monitoring Technology to Effectively Manage Insider Threats

Long Overdue: Shedding Legacy Employee Monitoring Technology to Effectively Manage Insider Threats

| | insider threat
The wave of recent headlines centered on the insider threat make it hard to deny that the dangers within our organizations are just as pervasive as those on the outside. The data ...

5 ways to find and fix open source vulnerabilities

A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ...
Loading...