Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.
Business Continuity Planning: How Data Security Can Help to Minimize Disruption
Business disruption is inevitable today. And increasingly it’s down to cyber incidents. Attacks caused $10.3bn in losses last year, in cases reported to the FBI alone. Even this figure is likely to ...
Why Generative AI is a Threat to API Security
Generative AI can be used to amplify cybercriminals' nefarious deeds against web applications, especially those that rely heavily on APIs ...
Security Boulevard
Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
Security Boulevard
An ‘Alarming Escalation’ of Sophistication in DDoS Attacks, Cloudflare Says
Distributed DDoS attacks are becoming increasingly sophisticated and complex, making an already-expanding threat landscape even more challenging ...
Security Boulevard
Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List
Richi Jennings | | android spyware, Biden administration, Commerce Department, Cytrox, Department of Commerce, Entity List, eu, Europe, European Union, European Union (EU), Intellexa, iOS spyware, Malware Spyware, Predator spyware, SB Blogwatch, spyware
European cousins Intellexa and Cytrox essentially banned by Commerce Dept. — Predator/ALIEN not welcome in U.S ...
Security Boulevard
PCI-DSS 4.0 is Here. What Does it Mean for Online Retailers?
PCI-DSS 4.0 was released in early 2022 with a two-year transition period to allow organizations time to learn about and implement it. Are you ready for the transition? ...
Security Boulevard
ChatGPT Provides Limited Help Identifying Malware
Current LLM-based tech like ChatGPT can accurately classify malware risk in only 5% of cases—and they may never be able to recognize novel approaches used to create malware ...
Security Boulevard
A Guide to GDPR Compliance
Enzoic | | account takeover, Active Directory, Data breaches, Identity Breach Monitoring, Regulation and Compliance
Read the key steps an organization handling EU citizens' data should initiate if a data breach transpires to comply with GDPR. The post A Guide to GDPR Compliance appeared first on Enzoic ...
CISA to Gov’t Agencies: Mitigate a Flaw in Windows and Office
The U.S. government is giving federal agencies three weeks to mitigate a zero-day Microsoft Windows and Office security flaw exploited by the Russian-linked RomCom threat group ...
Security Boulevard
LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack
BrianKrebs | | A Little Sunshine, abusewithus, AgentJags, Ashley Madison hack, Ashleymadison.com, Constella Intelligence, Data breaches, DomainTools, Eric Malek, Hulu, Impact Team, Jordan Evan Bloom, LeakedSource, Ne'er-Do-Well News, Near-reality.com, Noel Biderman, [email protected], PicTrace, Royal Canadian Mounted Police, Runescape, Trevor Sykes
[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called Defiant Tech ...