Google Cloud Platform allows data exfiltration without a (forensic) trace

Attackers can exfiltrate company data stored in Google Cloud Platform (GCP) storage buckets without leaving obvious forensic traces of the malicious activity in GCP’s storage access logs, Mitiga researchers have discovered. GCP data exfiltration … Continue reading Google Cloud Platform allows data exfiltration without a (forensic) trace

2FA is over. Long live 3FA!

In the past few months, we’ve seen an unprecedented number of identity theft attacks targeting accounts protected by two-factor authentication (2FA), challenging the perception that existing 2FA solutions provide adequate protection against identity th… Continue reading 2FA is over. Long live 3FA!

Cyber Week 2022 video walkthrough

Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. In this Help Net Security video, we take you inside Cyber Week 2022. The featured vendors are: Dig Security, Ermetic, enso, Forescout, Fl… Continue reading Cyber Week 2022 video walkthrough

Photos: Cyber Week 2022

Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. Cyber Week 2022 is held jointly by the Blavatnik Interdisciplinary Cyber Research Center (ICRC), The Yuval Ne’eman Workshop for Science, … Continue reading Photos: Cyber Week 2022

How to plan for increased security risks resulting from the Great Resignation

The Great Resignation is sweeping the world, and the causes and impacts are still being analyzed. Texas A&M University professor Anthony Klotz coined the term, predicting an unusual rise in voluntary resignations as employees anticipated the globa… Continue reading How to plan for increased security risks resulting from the Great Resignation