Insider attacks are harder to detect following migration to the cloud
New Website Mocks Excuses Given by Breached Companies
“Why the f*ck was I breached?” generates comic responses to use after a cybersecurity breach
California DMV Exposes Drivers’ Data for Four Years
Over 3,000 drivers affected by long-running Golden State DMV data breach
Facebook Admits Another Developer Privacy Snafu
Groups API wasn’t properly restricted, says social network
Researchers Lift the Lid on Politically Themed Malware
Cisco Talos uncovers microcosm of the threat landscape
Drone Wars: Experts Warn of Flying Network Security Threat
Next year could see weaponization of airspace around corporate buildings
#EdgeLondon2019: Focus on System and User Hygiene, Not Zero-Days
Focus more on hygiene, less on zero-days
Phishing Detection via Analytic Networks
As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to …
Defensive Security Podcast Episode 239
https://securityaffairs.co/wordpress/92484/data-breach/imperva-data-breach-2.html
https://arstechnica.com/information-technology/2019/10/the-count-of-managed-service-providers-getting-hit-with-ransomware-mounts/
https://www.zdnet.com/article/city-of-jo…