Phishing Used to Get PII, not Just Ransomware

With all of the focus on ransomware attacks, it’s easy to forget about the damage done by email phishing. Yet, new research from Vade shows that phishing has seen a meteoric rise in the first half of 2021, including a 281% increase in May and a 284% i… Continue reading Phishing Used to Get PII, not Just Ransomware

Shadow IT, Cloud-Based Malware Increase AppSec Risks

Cloud application security risks continue to rise as malware delivered by cloud applications continues to grow, according to a study by Netskope. The biannual study also highlighted the potential for critical data exfiltration tied to employees depart… Continue reading Shadow IT, Cloud-Based Malware Increase AppSec Risks

Anti-Vax Lies Spread on YouTube—Paid for ‘by Russian PR Company’

Disinformation is rife on social media. The latest scandal is a Russian PR firm paying YouTubers to flog lies about vaccines killing people.
The post Anti-Vax Lies Spread on YouTube—Paid for ‘by Russian PR Company’ appeared first on Security Boulevard… Continue reading Anti-Vax Lies Spread on YouTube—Paid for ‘by Russian PR Company’

Judge Orders Capitol Rioter to Unlock Laptop

Guy Reffitt traveled from his home in Wylie, Texas, to Washington, D.C., with an AR-15 rifle and a Smith & Wesson .40 caliber handgun, to participate in the riot and obstruction of Congress that occurred at the U.S. Capitol on January 6, 2021. He … Continue reading Judge Orders Capitol Rioter to Unlock Laptop

For Hackers, APIs are Low-Hanging Fruit

By 2022, API abuses will become the most frequent attack vector, predicts Gartner. We’re already witnessing new API exploits reach the headlines on a near-daily basis. Most infamous was the Equifax breach, an attack that exposed 147 million accounts i… Continue reading For Hackers, APIs are Low-Hanging Fruit

Understanding Certificate Policies and Practice Statements

Public key infrastructure (PKI) is the sort of technology that most users take for granted. They use it every day in a variety of ways but most don’t even realize it. PKI manages the digital certificates that encrypt sensitive data, secures web browsi… Continue reading Understanding Certificate Policies and Practice Statements

US Offers Bounty for Tips on State-Sponsored Cybercrime

Last week, the Biden administration announced a ‘new’ Rewards for Justice program offering up to $10 million USD for information relating to those who create and perpetuate ransomware attacks against U.S. infrastructure. The program, admin… Continue reading US Offers Bounty for Tips on State-Sponsored Cybercrime

Rapid7 Acquires IntSights to Gain External Threat Intelligence

Rapid7, Inc. this week announced it has acquired IntSights Cyber Intelligence Ltd. for $335 million as part of an effort to provide more visibility into potential external threats as they unfold on the dark web. Richard Perkett, vice president of dete… Continue reading Rapid7 Acquires IntSights to Gain External Threat Intelligence

Securing UX in Open Banking Apps

Historically, only large, well-established banks had control over the majority of consumer and corporate finances, making it highly challenging for smaller financial services providers to break into the market. Open banking has transformed the way org… Continue reading Securing UX in Open Banking Apps

How (and Why) Hacker Forums Self-Moderate

“Everything in moderation,” the saying goes. But it may come as a surprise that this expression even seems to apply to many of the hacker forums littered across the dark web. On the surface, these forums may appear to be a lawless landscape, but there… Continue reading How (and Why) Hacker Forums Self-Moderate