Attack
The Urgency to Uplevel AppSec: Securing Your Organization’s Vulnerable Building Blocks
Let’s examine why so many applications remain vulnerable despite high-severity warnings and how to minimize the threat to your organization ...
Security Boulevard
5 Ways MSPs Can Resolve a Hack
If you are a managed service provider (MSP) handling small and medium-sized businesses (SMB) clients, ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/6
David Lindner, Director, Application Security | | AI, Attack, CISO, Cybersecurity, Cybersecurity Awareness Month, Scams, Thought Leaders, Voice Cloning
Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing. ...
Cybersecurity Insights with Contrast CISO David Lindner | 9/29
David Lindner, Director, Application Security | | Attack, CISO, Cybersecurity, Dependabot, GitHub, passwords, supply chain, Thought Leaders
Insight #1 For years — since 2018 — the National Institute of Standards and Technology (NIST) has said that password length trumps password complexity requirements. Now LastPass is forcing users into choosing ...
MGM Breach Takeaway: On-Prem Has Become Attackers’ Gateway to the Cloud
Don Hoffman | | Attack, Breach, Cloud, Combatting Identity Threats, hybrid, lateral movement, On-prem, Ransomware, SaaS
Last week, the BlackCat ransomware group (also known as ALPHV) attacked the operations of MGM Resorts and forced them to shut down their IT systems. What sets this attack apart from more ...
External Exposure Management: Key to Safeguarding Your Attack Surface
The number of security threats continues to grow rapidly with each passing year. Security teams work tirelessly to mitigate every alert labeled ‘high priority’—but there are too many, and it’s tough to ...
Security Boulevard
The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff
Tom Eston | | Attack, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, end-to-end encryption, Episodes, gamification, Information Security, Infosec, lastpass, legislation, password manager, passwords, Podcast, Podcasts, Privacy, security, Security Awareness, signal, technology, training, uk, United Kingdom, Weekly Edition
Popular password manager LastPass suffered a second attack that lasted for over two months. Now new and disturbing information is being released about the attack. Scott discusses the benefits and challenges of ...
Major Database Security Threats & How You Can Prevent Them
Tripwire Guest Authors | | Attack, database, Featured Articles, Permissions, Security Controls, Security threats, threats, Vulnerabilities, Vulnerability Management
Organizations and businesses must use a range of measures, protocols, and tools to protect their databases from cybercriminals. If breached, malicious actors can gain access to sensitive information that they can use ...
Graph-Fueled Defense-in-Depth Can Strengthen Security Posture
“GM Customer Accounts Hacked”, “Hacker Steals Database of Hundreds of Verizon Employees”, “Ransomware Attack Hits New Jersey County”. Another day, another breach, hack or ransomware attack. In fact, the average cost of a ...
Security Boulevard
Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser
Tom Eston | | Attack, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, facebook, Information Security, Infosec, Instagram, Mobile, Multi-Factor Authentication, Podcast, Privacy, Ransomware, security, signal, SMS, technology, tracking, Twilio, web browser, Weekly Edition
A Cisco employee was compromised by a ransomware gang using a technique called multi-factor authentication fatigue, an attack on the Signal messenger app’s SMS service Twilio potentially disclosed the phone numbers of ...