September 16, 2019
Mike Jansen, deltarisk.com, September 12, 2019
Insider threats have been around since the dawn of time, and they’ve always been a challenge to prevent and detect. What can you do to combat this? Find out in our latest blog.
threatpost.com, September 12, 2019
Charity organization UNICEF inadvertently leaked the personal details of thousands of people who use its online learning portal with an errant email sent to 20,000 inboxes.
zdnet.com, September 16, 2019
The personal records of most of Ecuador’s population has been left exposed online due to a misconfigured database. The leaky server could be the biggest data breaches in Ecuador history.
cyberscoop.com, September 12, 2019
A vulnerability in smartphone technology has made it possible for outsiders to conduct targeted surveillance against victims for the past two years, according to new security findings.
msspalert.com, September 12, 2019
Two years after WannaCry wreaked havoc via unpatched SMB_v1 and three years after Mirai infected internet of things devices en masse via default credentials, attackers continue to target the same flaws.
infosecurity-magazine.com, September 13, 2019
Two employees of a Colorado cyber security firm hired to test the security of an Iowa courthouse have been charged with burglary after allegedly breaking into the building.
bleepingcomputer.com, September 13, 2019
Entercom Communications, one of the largest radio station owners in the U.S., has been dealing with a cyber attack that looks very much like a ransomware incident.
In this white paper, updated for 2019, our experts draw on their experiences with hundreds of pen testing and vulnerability assessments for clients. They share the strategy and tactics that they use to successfully bypass security controls to get into networks and systems – the same methods that malicious hackers use. Learn more about these methods and how to protect your organization. Download our white paper here.
Share this Post