Third-party provider is targeted as firms scramble for workarounds
Americans Resigned to ID Theft, But Taking Steps
Many Americans are taking steps to change their behavior in order to be more protected.
Majority of Critical Infrastructure Orgs Unprepared for Attacks
60% of executives said they lack appropriate controls to protect their environments.
Fake WhatsApp Riskware Points to Copycatting
The app steals information, photos, phone numbers and so on from a mobile phone.
Grindr Under Fire for Sharing HIV Status of Users
Grindr will stop sharing users’ HIV statuses after it was revealed they were shared with third-party analytics companies
Panera Bread Data Leak May Have Hit Millions: Report
Bakery chain needs to get better at incident response, claim experts
US Govt Wants Nearly All Visa Applicants to Hand Over Personal Info
It wants social media handles, phone numbers and more…from all travelers
toolsmith #132 – The HELK vs APTSimulator – Part 2
Continuing where we left off in The HELK vs APTSimulator – Part 1, I will focus our attention on additional, useful HELK features to aid you in your threat hunting practice. HELK offers Apache Spark, GraphFrames, and Jupyter Notebooks a…
Pentagon Kicks Off Latest Bug Bounty Challenge
It will focus on the internal enterprise systems relied upon by millions of employees for global operations.