Some metrics are more valuable than others in making measurable improvement in security
Researcher Guesses Password to Access Trump Twitter Account
Two-factor authentication belatedly switched on after incident
#COVID19 Vaccine-Maker Shuts Global Plants After Cyber-Attack
Dr Reddy’s had just been granted permission to start trials
#SecTorCa: A Hacker’s Perspective on Your Infrastructure
At the SecTor virtual security conference, pen tester outlines the security issues that give hackers easy access to attack users
Oregon Retailer Suffers Sustained Data Breach
Data breach at Made in Oregon goes unnoticed for six months
Attackers Spoof Microsoft Teams
Cyber-criminals impersonate Microsoft Teams to phish for employees’ credentials
#InfosecurityOnline: Adapting Security Strategies to Growing Digitalization
Security practices need to keep up-to-date with increasing digitalization
Fraud Analysts Miss Dark Web Data
Nearly half of fraud analysts investigating financial crimes are not able to follow leads into the dark web
#InfosecurityOnline: Tactics for Defending Against Credential Stuffing
How to spot and defeat credential stuffing attacks using bot detection and network visibility
KashmirBlack Botnet Uses DevOps to Stay Agile
Imperva warns of millions of victims around the world