data breach
-
News
TikTok Assures U.S. Lawmakers it’s Working to Safeguard User Data From Chinese Staff
Following heightened worries that U.S. users’ data had been accessed by TikTok engineers in China between September 2021 and January…
Read More » -
News
Google Improves Its Password Manager to Boost Security Across All Platforms
Google on Thursday announced a slew of improvements to its password manager service aimed at creating a more consistent look…
Read More » -
News
Microsoft Warns About Evolving Capabilities of Toll Fraud Android Malware Apps
Microsoft has detailed the evolving capabilities of toll fraud malware apps on Android, pointing out its “complex multi-step attack flow”…
Read More » -
News
New ‘SessionManager’ Backdoor Targeting Microsoft IIS Servers in the Wild
A newly discovered malware has been put to use in the wild at least since March 2021 to backdoor Microsoft…
Read More » -
News
3 security lessons we haven’t learned from the Kaseya breach
Not everyone had the luxury of enjoying BBQ and backyard time last Fourth of July weekend. Kaseya, an IT management…
Read More » -
News
Solving the indirect vulnerability enigma – fixing indirect vulnerabilities without breaking your dependency tree
Fixing indirect vulnerabilities is one of those complex, tedious and, quite frankly, boring tasks that no one really wants to…
Read More » -
News
Amazon Quietly Patches ‘High Severity’ Vulnerability in Android Photos App
Amazon, in December 2021, patched a high severity vulnerability affecting its Photos app for Android that could have been exploited…
Read More » -
News
Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers
A cloud threat actor group tracked as 8220 has updated its malware toolset to breach Linux servers with the goal…
Read More » -
News
Lessons learned from slew of recent data breaches
The 2021 Verizon Data Breach Investigations Report (DBIR) revealed that 85% of breaches involved a human element, and 61% involved…
Read More » -
News
What is Shadow IT and why is it so risky?
Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users…
Read More »