Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.

The post Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers appeared first on Security Intelligence.

Continue reading Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

Most credential abuse attacks against the financial sector targeted APIs

From May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targeting APIs, in an effort to bypass security controls. According to data from Akamai, up to 75% of all credential abuse attacks against th… Continue reading Most credential abuse attacks against the financial sector targeted APIs

A closer look at the global threat landscape

60% of initial entries into victims’ networks leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to gain access, according to a new IBM report exploring the global threat lands… Continue reading A closer look at the global threat landscape

Can passing credentials as parameters to CloudFormation templates via a build script be secure?

I have a CloudFormation stack that currently resolves credentials from the AWS Systems Manager parameter store.

I’d like to change how it gets credentials.

Now I would like to:

Use the Python requests library to make a get request for … Continue reading Can passing credentials as parameters to CloudFormation templates via a build script be secure?