September 16, 2019

[Blog] Reducing Insider Threat Risk Through IAM

Mike Jansen,, September 12, 2019 

Insider threats have been around since the dawn of time, and they’ve always been a challenge to prevent and detect. What can you do to combat this? Find out in our latest blog.

Read More

UNICEF Leaks Personal Data of 8,000 Users via Email, September 12, 2019 

Charity organization UNICEF inadvertently leaked the personal details of thousands of people who use its online learning portal with an errant email sent to 20,000 inboxes.

Read More

Database Leaks Data on Most of Ecuador’s Citizens, Including 6.7 Million Children, September 16, 2019

The personal records of most of Ecuador’s population has been left exposed online due to a misconfigured database. The leaky server could be the biggest data breaches in Ecuador history.

Read More

Meet ‘Simjacker,’ a Nasty Mobile Vulnerability that Could Put 1 Billion Phones at Risk, September 12, 2019

A vulnerability in smartphone technology has made it possible for outsiders to conduct targeted surveillance against victims for the past two years, according to new security findings.

Read More

Attacks Targeting IoT Devices and Windows SMB Surge, September 12, 2019

Two years after WannaCry wreaked havoc via unpatched SMB_v1 and three years after Mirai infected internet of things devices en masse via default credentials, attackers continue to target the same flaws.

Read More

Cyber Security Firm Employees Charged with Burglary of Courthouse Client, September 13, 2019  

Two employees of a Colorado cyber security firm hired to test the security of an Iowa courthouse have been charged with burglary after allegedly breaking into the building.

Read More

Giant Entercom Radio Network Deals with Ransomware-Like Incident, September 13, 2019  

Entercom Communications, one of the largest radio station owners in the U.S., has been dealing with a cyber attack that looks very much like a ransomware incident.

Read More

[White Paper] Hacker Secrets Revealed

In this white paper, updated for 2019, our experts draw on their experiences with hundreds of pen testing and vulnerability assessments for clients. They share the strategy and tactics that they use to successfully bypass security controls to get into networks and systems – the same methods that malicious hackers use. Learn more about these methods and how to protect your organization. Download our white paper here.

Download Here

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
2019 Cloud Security Report

Share this Post