Regulatory Compliance
CrowdStrike Admits it Doesn’t ‘Canary’ Test all Updates
Richi Jennings | | canary deployment, CrowdStrike, CrowdStrike Falcon, CrowdStrike Falcon XDR, Downtime and outages, outage, Outage Investigation, SB Blogwatch
Corporate incompetence: Beleaguered security firm issues initial post-mortem on Friday’s faux pas ...
Security Boulevard
EFF Angry as Google Keeps 3rd-Party Cookies in Chrome
Richi Jennings | | adtech, Advertising, Advertising and AdTech, adverts, Chrome, CMA, Competition and Markets Authority, cookie, Cookie Consent, cookieconsent, cookies, Data Privacy, EFF, Electronic Frontier Foundation, FLEDGE, FLoC, GOOG, google, Google Chrome, ICO, information commissioner's office, IP Protection, Privacy, Privacy Sandbox, regulatory capture, SB Blogwatch, Surveillance capitalism, Topics, tracking, tracking cookies, web cookie, zero trust
Regulatory capture by stealth? Google changes its mind about third-party tracking cookies—we’re stuck with them for the foreseeable ...
Security Boulevard
AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again
Richi Jennings | | 2 factor auth, 2-factor authentication, 2fa, ATT, Cloud MFA, Data leak, DUAL FACTOR AUTHENTICATION, MFA, mult-factor authentication, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, NYSE:SNOW, NYSE:T, Privacy, SB Blogwatch, ShinyHunters, snowflake, threats, two factor authentication, UNC5537
Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them ...
Security Boulevard
Biggest Ever Password Leak — but is ObamaCare’s RockYou2024 Really NEW?
Richi Jennings | | credentials, Cybersecurity, Malware, ObamaCare, Passkeys, passwords, rockyou2021, RockYou2024, SB Blogwatch
Credential crunch: Ten billion plain-text passwords in a file—sky falling or situation normal? ...
Security Boulevard
Compliance, Security and the Role of Identity
While compliance frameworks establish baseline requirements for data protection, they may not always align with the rapidly evolving threat landscape ...
Security Boulevard
Temu is Malware — It Sells Your Info, Accuses Ark. AG
Richi Jennings | | breach of privacy, china, china espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, customer location, geofencing and location tracking, geolocation, Location, location access permission, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location services, location sharing location tracking, PDD Holdings, Pinduoduo, Privacy, SB Blogwatch, Temu, Whaleco
Chinese fast-fashion-cum-junk retailer “is a data-theft business.” ...
Security Boulevard
Microsoft Privacy FAIL: Windows 11 Silently Backs Up to OneDrive
Richi Jennings | | Microsoft, Microsoft Account Security, Microsoft OneDrive, Microsoft Windows, OneDrive, Privacy, SB Blogwatch, Windows, Windows 11
Copying users’ files and deleting some? Even a cartoon hound knows this isn’t fine ...
Security Boulevard
It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever.
Modern chief information security officers (CISOs) are navigating tough circumstances due to complex challenges and heightened regulatory pressures ...
Security Boulevard
EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped
Richi Jennings | | Chat Control, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, CSAM, CSEM, E2EE, encryption, end-to-end encryption, eu, Europe, European Compliance, european election, European Governments, European legislation, European Union, European Union (EU), SB Blogwatch, signal, WhatsApp, Won’t somebody think of the children?
Ongoing European Union quest to break end-to-end encryption (E2EE) mysteriously disappears ...
Security Boulevard
ASUS Router User? Patch ASAP!
Richi Jennings | | Asus, Attacking Routers, CVE-2024-3079, CVE-2024-3080, CVE-2024-3912, firmware, firmware attacks, firmware patch, firmware security, firmware update, Firmware Updates, Firmware Vulnerabilities, firmware vulnerability, flawed routers, IoT firmware, Malicious Firmware Updates, router, router compromise, router exploit, router hacking, router hijacking, router malware, router security, router vulnerabilities, router vulnerability, SB Blogwatch
Or junk it if EOL: Two nasty vulnerabilities need an update—pronto ...
Security Boulevard