Data Security
One-Third Of Companies Suffered SaaS Breach This Year
SaaS breaches are on the rise, and nearly half the corporate victims have more than 2,500 employees. Those are among the sobering conclusions from a survey of security experts at 644 organizations ...
Potential Surge in Cryptocurrency Leaks
Increase in Cryptocurrency Leaks After Trump Supports Bitcoin Recently, Constella Intelligence has observed an increase in attacks and data breaches resulting in cryptocurrency leaks. This surge could be partly attributed to comments ...
Unlock Your Digital Freedom: How Automating Passwordless Authentication Can Transform Your Security
In a world where cybersecurity threats are ever-evolving, automating passwordless authentication emerges as a game-changer. Learn how this innovative approach can not only bolster your security but also streamline the user experience ...
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...
Event Logging Key to Detecting LOTL Attacks, Security Agencies Say
A report by CISA, the FBI, the NSA, and international agencies lay out the argument that event logging tools help enterprises better detect attacks that rely on LOTL techniques used by threat ...
Audit: FBI is Losing Track of Storage Devices Holding Sensitive Data
DOJ inspectors have found the FBI is not labeling hard drives and other storage devices holding sensitive that are slated for destruction, making them hard to track, and that boxes of them ...
Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Implementing shared threat intelligence across an alliance of cybersecurity experts creates a more robust security approach ...
How Financial Institutions Can Manage Mounting Digital Sovereignty Requirements
Financial services is among the most highly regulated of any industry – and justifiably so. As critical infrastructure, the sector provides services which, if interrupted or destabilized, could have a catastrophic impact ...
Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning
A backdoor found in millions of Chinese-made RFID cards that are used by hotels and other businesses around the world can let bad actors instantly clone the cards to gain unauthorized access ...
Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event
Black Hat 2024 tackled global challenges, briefings that dived into the depths of emerging threats, and an undeniable focus on data breaches ...