Free VPN app SuperVPN data leak exposed over 360 million records that could identify users. The app has over 100 million downloads on Google Play and Apple's App Store.
Staff Correspondent at CPO Magazine
Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news.
Apria healthcare data breach has exposed the personal, medical, and financial information of up to 1.8 million individuals. The cyber intrusions occurred from April 5 to May 7, 2019, and from August 27 to October 10, 2021.
Bad bots account for 30% of internet traffic and are increasingly used in account takeover and API attacks, while human traffic fell to an 8-year low of just over half of all internet traffic.
Authorities in the U.S. and Australia have warned that the BianLian ransomware gang has abandoned the double extortion model for purely data extortion attacks. More groups are likely to follow suit and forego the hassle of developing and managing the encryption and decryption process in favor of a less complicated attack,
Group-IB researchers infiltrated the Qilin ransomware operation and observed that the group's payment structure rewards affiliates with 80% from a ransomware payout of $3 million or less and 85% for any payout exceeding $3 million.
IGA is critical to ensuring security and compliance because it gives visibility into who has access to what guarantees that access privileges are issued in accordance with preset regulations, and allows for rapid response to access-related security issues.
Single Sign-On (SSO) and Security Assertion Markup Language (SAML) are both crucial elements in the world of identity and access management (IAM), but they are not the same thing. They are, however, closely related and often used together to provide secure, streamlined access to multiple applications.
Nowadays, a lot of businesses are using passwordless authentication techniques. These can include SMS codes, which send a one-time code to the customer's phone, email magic links, which send a one-time link to the customer's email address, and social login, which allows users to log in using their Facebook or Google credentials.
Active Directory administration is critical in protecting organizations from cyber threats. Organizations can ensure that users only have access to the data and systems required to perform their job duties by managing access rights.
Implementing MFA methods improves an organization's security posture by lowering the likelihood of identity theft, as a hacker would require more than just the user's password to obtain access to their account.