Is your identity safe? Exploring the gaps in threat protection

A recent study from Silverfort has identified the identity attack surface as today’s most substantial weakness in cybersecurity resilience. Traditional approaches, such as MFA and PAM, have notable limitations that can lead to the exploitation of… Continue reading Is your identity safe? Exploring the gaps in threat protection

Current ransomware defenses efforts are not working

Despite some positive developments, the impact of ransomware attacks remains high, according to SpyCloud. Infostealer infections preceded 22% of ransomware events for North American and European ransomware victim companies in 2023 – with common infoste… Continue reading Current ransomware defenses efforts are not working

Why more security doesn’t mean more effective compliance

Financial institutions have always been a valuable target for cyberattacks. That’s partly why banking and financial institutions are heavily regulated and have more compliance requirements than those in most other industries. A slew of new rules have b… Continue reading Why more security doesn’t mean more effective compliance

Avoiding domain security risks when taking your business online

Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by… Continue reading Avoiding domain security risks when taking your business online

Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks 

A recently introduced Google account sync feature has been blamed after sophisticated hackers attacked 27 cryptocurrency firms via Retool.
The post Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks  appeared first on Securit… Continue reading Google Feature Blamed for Retool Breach That Led to Cryptocurrency Firm Hacks 

Enterprises persist with outdated authentication strategies

Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are stru… Continue reading Enterprises persist with outdated authentication strategies

Attackers hit software firm Retool to get to crypto companies and assets

Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers to access and take over accounts of 27 cloud customers, all in the crypto industry. According to a CoinDes… Continue reading Attackers hit software firm Retool to get to crypto companies and assets

Implementing the Least Privilege Principle to Safeguard Your Assets

By Owais Sultan
The least privilege principle is a crucial concept in cybersecurity that involves granting users the minimum level of…
This is a post from HackRead.com Read the original post: Implementing the Least Privilege Principle to Safeguar… Continue reading Implementing the Least Privilege Principle to Safeguard Your Assets

Companies need to rethink how they implement identity security

More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, according to Silverfort and Osterman Research. Lack of visibility into the identi… Continue reading Companies need to rethink how they implement identity security

Cisco VPNs with no MFA enabled hit by ransomware groups

Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via Cisco ASA SSL VPN appliances. “In some cases, adversaries have conducted credential stuffing attacks that… Continue reading Cisco VPNs with no MFA enabled hit by ransomware groups