Credential Theft: Over One Million Clubhouse User Records Leaked

This week saw the breach of the popular social media application Clubhouse when 1.3 million user records were scraped from an SQL database and leaked online via a popular hacker forum. This is the latest in a series of successful social media breaches … Continue reading Credential Theft: Over One Million Clubhouse User Records Leaked

Combating COMB: 3.2 billion credentials leaked in breach compilation

2021 has barely begun and we have already witnessed what appears to be the biggest compilation of breached credentials in our lifetime. The Compilation of Many Breaches (COMB) was recently made available via an online forum, as broken by CyberNews, and… Continue reading Combating COMB: 3.2 billion credentials leaked in breach compilation

Threat intelligence vs. future data breaches

Data breaches are increasingly common as organizations across the globe continue to wake up to the reality that it’s a question of when, not if, they will fall victim. In a 2020 report on cyber security breaches, the UK government revealed that nearly … Continue reading Threat intelligence vs. future data breaches

Everything we know about the SolarWinds Orion app vulnerability

The story so far In December 2020 the widely used business software application Orion, a product of the popular IT management company SolarWinds, was reported to have been tainted with nation-state malware that affected versions 2019.4 through to 2020…. Continue reading Everything we know about the SolarWinds Orion app vulnerability

Threat actors’ dangerous and rising interest in the global energy industry

The energy sector is no stranger to digital transformation. Like so many industries before it, energy is currently in the midst of significant digital growth, thanks to developments in artificial intelligence (AI), the Internet of Things (IOT), blockch… Continue reading Threat actors’ dangerous and rising interest in the global energy industry

Si superas el límite de almacenamiento durante 2 años, es posible que eliminemos tu contenido de Gmail, Drive y Fotos.

Correo de actualización de las políticas de Google .showdesktop{ display:block; } .showmobile{ display:none; } @media screen and (max-width:823px){ .showmobile{display:block !important;} .showdesktop{display:none !important;} } .showdesktop1{ display:b… Continue reading Si superas el límite de almacenamiento durante 2 años, es posible que eliminemos tu contenido de Gmail, Drive y Fotos.

Why SIEMs need threat intelligence to defeat Cyberthreats

Security professionals the world over crave compliance management and the ability to pull deep insights from their complex IT environments. This need was the catalyst for the initial adoption of security information and event management (SIEM), which, … Continue reading Why SIEMs need threat intelligence to defeat Cyberthreats

Threat intelligence vs. the rise in sophisticated ransomware

Ransomware, alongside COVID-19, has dominated the years’ headlines, positioning it as the most observed threat of 2020. Recorded ransomware attacks have multiplied dramatically since the beginning of 2020, accounting for a third of all recorded attacks… Continue reading Threat intelligence vs. the rise in sophisticated ransomware