Threats and Breaches

Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.

Introducing Goffloader: A Pure Go Implementation of an In-Memory COFFLoader and PE Loader

We are excited to announce the release of Goffloader, a pure Go implementation of an in-memory COFFLoader and PE loader. This tool is designed to facilitate the easy execution of Cobalt Strike ...
august data breaches

Data Breaches for the Month August 2024

This month has been a challenging month for organizations worldwide as several high-profile data breaches occur and become headlines. These incidents have not only exposed sensitive information but also highlighted... The post ...
data, breaches, data breaches, NetApp data broker FTC location data

Missing Guardrails, a Troubling Trend in Data Protection

| | data, Data breach
An estimated 2.7 billion personal records were stolen from National Public Data (NPD), a Florida-based data broker company that collects and sells personal data for background checks ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24

Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24

Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...
DDoS attacks, detect, A10 DDoS AI machine learning

Radware Report Surfaces Increasing Waves of DDoS Attacks

| | DDoS attacks
A report by Radware finds that DDoS attacks are increasing not only in number and volume, some lasting as long as 100 hours over six days ...
Security Boulevard
Get a demo

Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives

Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have ...
3CX-fig-01

3CX Phone System Local Privilege Escalation Vulnerability

Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Recently, we ...

Oregon Zoo Data Breach Exposes Payment Card Information

The Oregon Zoo's recent data breach serves as a stark reminder of the urgent need for robust cybersecurity measures in today's digital landscape. With over 117,000 payment card details potentially compromised, this ...
appsentinels integration

Strengthening API Security with AppSentinels Integration in the Strobes Platform

APIs are the backbone of apps and cloud services, making everything work seamlessly behind the scenes. But with their power comes a unique set of security challenges that can’t be... The post ...

Application Security Check Up