Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

1 year ago

A long supply chain adds third-party risks, as each partner's security affects your own, making identity and access management more…

Black Basta affiliates used Microsoft Teams in recent attacks

1 year ago

ReliaQuest researchers observed Black Basta affiliates relying on Microsoft Teams to gain initial access to target networks. ReliaQuest researchers warn…

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 17

1 year ago

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security…

Security Affairs newsletter Round 495 by Pierluigi Paganini – INTERNATIONAL EDITION

1 year ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

Four REvil Ransomware members sentenced for hacking and money laundering

1 year ago

Russian authorities sentenced four members of the REvil ransomware operation to several years in prison in Russia. Four former members…

Chinese cyber spies targeted phones used by Trump and Vance

1 year ago

China-linked threat actors targeted the phone communications of Donald Trump and vice presidential nominee JD Vance. China-linked hackers reportedly targeted phones…

Irish Data Protection Commission fined LinkedIn €310M for GDPR infringement

1 year ago

Irish Data Protection Commission fined LinkedIn €310M for violating user privacy by using behavioral data analysis for targeted advertising. Irish…

Change Healthcare data breach impacted over 100 million people

1 year ago

The Change Healthcare data breach in the February 2024 impacted over 100 million, the largest-ever healthcare data breach in the…

OnePoint Patient Care data breach impacted 795916 individuals

1 year ago

US hospice pharmacy OnePoint Patient Care suffered a data breach that exposed the personal info of approximately 800,000 individuals. OnePoint…

From Risk Assessment to Action: Improving Your DLP Response<gwmw style="display:none;"></gwmw>

1 year ago

DLP is key in cybersecurity; a risk assessment identifies data risks, helping turn findings into real-world security improvements. Data loss…

This website uses cookies.