You might be interested in …

[ThreatPost] Insider Risks In the Work-From-Home World

All posts, ThreatPost

Forcepoint’s Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk, particularly with pandemic-expanded network perimeters. Source: Read More (Threatpost)

Read More

[HackerNews] Researchers Trace LAPSUS$ Cyber Attacks to 16-Year-Old Hacker from England

All posts, HackerNews

Authentication services provider Okta on Wednesday named Sitel as the third-party linked to a security incident experienced by the company in late January that allowed the LAPSUS$ extortion gang to remotely take over an internal account belonging to a customer support engineer. The company added that 366 corporate customers, or about 2.5% of its customer base, may […]

Read More

[SecurityWeek] How Low-level Hackers Access High-end Malware

All posts, Security Week

Hacking tool downloads from underground forums are increasing, and the tools are becoming more sophisticated; low-level hackers are gaining access to hacked versions of sophisticated tools; access broking is growing; and existing tools are repurposed for more aggressive attacks. read more Source: Read More (SecurityWeek RSS Feed)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.