What Happens to Information After a Data Breach?

We’ve grown accustomed to it by now — a few million accounts broken into here, another hundred million there. After a company data breach, what happens to all the data? Where does it go? And how does this impact your vulnerability analysis? In June 2020, stolen Facebook user data suddenly popped up for sale on […]

The post What Happens to Information After a Data Breach? appeared first on Security Intelligence.

Continue reading What Happens to Information After a Data Breach?

Is DSA-1024 safe to sign package repositories ? What are the reasons?

I recently found that the latest release of a major Linux distribution (MX Linux) uses DSA-1024 in /etc/apt/trusted.gpg and in /etc/apt/trusted.gpg.d/*.gpg
It also probably uses SHA-1 as the signature algorithm (which is the most common on… Continue reading Is DSA-1024 safe to sign package repositories ? What are the reasons?

Behavior Transparency: Where Application Security Meets Cyber Awareness

How can you tell when software is behaving strangely if you don’t know what the right behavior is? That’s an important question when it comes to threat actors. After all, attackers often hijack honest software, networks and systems for dishonest ends. To stop them with security tools, the first step must be to have great […]

The post Behavior Transparency: Where Application Security Meets Cyber Awareness appeared first on Security Intelligence.

Continue reading Behavior Transparency: Where Application Security Meets Cyber Awareness

Spend Wisely (Not Just More) to Become Cyber Resilient

Spending on cybersecurity is hitting record highs. And that makes sense. Because of big changes in how work gets done (plus the rising cost of breaches and attacks, like ransomware), companies are spending more than ever. But simply throwing money at the problem in order to try to become more cyber resilient is not a […]

The post Spend Wisely (Not Just More) to Become Cyber Resilient appeared first on Security Intelligence.

Continue reading Spend Wisely (Not Just More) to Become Cyber Resilient

bc-fips-1.0.1 security vulnerability, CVE-2018-1000180 and CVE-2020-26939 [closed]

With bc-fips-1.0.1 there are below security vulnerabilities

CVE-2018-1000180
CVE-2020-26939

What are the impacts of those two CVE? Are this risks are very critical?
Both are fixed in bc-fips-1.0.2 but this version is degrading performanc… Continue reading bc-fips-1.0.1 security vulnerability, CVE-2018-1000180 and CVE-2020-26939 [closed]