A Closer Look at the LAPSUS$ Data Extortion Group
Microsoft and identity management platform Okta both disclosed this week breaches involving LAPSUS$, a relatively new cybercrime group that specializes…
Microsoft and identity management platform Okta both disclosed this week breaches involving LAPSUS$, a relatively new cybercrime group that specializes…
You Can’t Fix Stupid By Guy Rosefelt, CPO, Sangfor Technologies Stop me if you have heard this one: […] The…
Pavel Vrublevsky, founder of the Russian payment technology firm ChronoPay and the antagonist in my 2014 book "Spam Nation," was…
If every application, device, and bot need access and authentication at some point, the need for managing and controlling the…
Moscow-based meat producer and distributor Miratorg Agribusiness Holding has suffered a major cyberattack that encrypted its IT systems, according to a report…
Strong demand for application security that supports DevSecOps initiatives drives investment from Koch Disruptive Technologies and New Enterprise Associates.
Designing a solid security interface, like most things, is more of a human problem than a technical one.
TransUnion South Africa has disclosed that hackers breached one of their servers using stolen credentials and demanded a extortion demand…
Step up training with cybersecurity drills, teach how to avoid social engineering traps, share open source monitoring tools, and make…
It's more important than ever for companies to challenge their defenses, learning about new gaps and opportunities for improvement along…