Preparing for the Future: Understanding Identity’s Role in Data Security
By Gal Helemski, Co-Founder and CTO/CPO at PlainID “Data is the lifeblood of an organization.” Becoming somewhat of a platitude in the security space, it’s…
By Gal Helemski, Co-Founder and CTO/CPO at PlainID “Data is the lifeblood of an organization.” Becoming somewhat of a platitude in the security space, it’s…
In 2019, cybersecurity firm Group-IB exposed a Russia-based scam-as-a-service operation. This scheme, initially known as Classiscam, employed counterfeit classified advertisements and social engineering tactics to…
In a concerning turn of events, the servers of Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) fell victim to a cyberattack…
Sep 01, 2023THNDatabase Security / Ransomware Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a ransomware strain…
Domain names ending in “.US” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows.…
Unraveling EternalBlue: inside the WannaCry’s enabler Pierluigi Paganini September 01, 2023 WannaCry and NotPetya, probably two most damaging cyberattacks in recent history, were both only…
The Scottish Police Authority (SPA) has approved a five-year digital strategy for Police Scotland that seeks to shift the force from “doing digital” to “being…
Researchers released a free decryptor for the Key Group ransomware Pierluigi Paganini September 01, 2023 Researchers released a free decryptor for the Key Group ransomware…
We know that the cybersecurity industry has a skills gap and talent shortage. We also know that hiring from a larger, more diverse talent pool…
Plans by the government in the Online Safety Bill to require tech companies to scan encrypted messages will damage the UK’s reputation for data security,…
Hello Hackers, Live Hacking Events are an experience like no other: hackers collaborate and connect with security teams, each other and HackerOne. 2022 is our…
Multiple threat actors have adopted ‘SapphireStealer’ after the information stealer’s source code was published on GitHub, Cisco’s Talos security researchers report. Written in .NET, the…