Recent creative crypto scams illustrate some specific things that investors need to be prepared for. A scam involving Squid Game demonstrates how FOMO can catch investors, and a Google Ads scheme used phishing techniques to steal wallets.
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system.
The sheer number of reports that cloud security teams deal with are becoming a serious problem, and "alert fatigue" is causing critical alerts to be missed at an alarming rate.
A new "combination file" offered on the dark web that makes connections between Clubhouse and Facebook users is a threat to create a spike in specific attack types, namely phishing and account takeover attempts.
A spyware vendor in Spain has been linked to a zero-day exploitation framework that impacted Windows, as well as the Chrome and Firefox browsers, from 2018 to 2021. Google researchers present markers found in its code including a script that is signed by the company.
Only 55% of the organizations surveyed are carrying any cyber insurance at all. And of those that are insured, just under 20% have more than $600,000 in coverage; not enough to meet the usual ransomware payment, let alone the potential cleanup costs.
A hacker is claiming to have stolen over one billion user records, but security researchers are not convinced that this came from a legitimate TikTok hack or that account takeovers were involved.
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.
RF-enabled devices are now prevalent in the enterprise and RF security is getting harder to enforce in secure facilities that require more nuanced electronic device policies.
For IT asset disposition (ITAD), data safety and destruction isn’t just a technological issue, it’s a human one as well – based on procedure and trust. So how do we build a more trustworthy process?