Leaked API keys allow threat actors to perform a variety of unauthorized actions
NIST to Scrap SHA-1 Algorithm by 2030
The agency said it will stop using SHA-1 in its last remaining specified protocols by December 31 2030
API Vulnerabilities Discovered in LEGO Marketplace
The vulnerabilities, which are now fixed, could have put sensitive customer data at risk
Agenda Ransomware Switches to Rust to Attack Critical Infrastructure
Victim companies have a combined revenue of around $550m
Meta’s Bug Bounty Program Shows $2m Awarded in 2022
The total amount since the program’s establishment in 2011 is reportedly $16m
Social Blade Confirms Data Breach Exposing PII on the Dark Web
The company confirmed the data does not include any credit card information
Careful Workload Placement Can Create Cloud Cost Savings
Optimizing the cost-effectiveness of cloud infrastructure requires the careful placement of workloads in the environments best suited to their execution.
Two-Thirds of Security Pros Have Burnt Out in Past Year
Excessive workload is the most common contributing factor
Former Twitter Employee Gets 42 Months for Saudi Scheme
Insider was bribed by the Middle East kingdom
OECD Signs “Landmark” Privacy Agreement
Club of rich countries wants to improve cross-border data flows