This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Regulatory compliance and dataprivacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style dataprivacy laws came to the U.S. Location Matters.
(ISC)2 : This organization offers free self-paced training for a limited time but is more recognized for its high-end Certified Information Systems Security Professional (CISSP) designation, acknowledging your ability to design and monitor a secure system environment, qualifying holders for engineering and executive infosec positions.
These environments often replicate production systems but may lack the same security controls, making them vulnerable to databreaches. The post 7 features to look for in a PII Data Discovery Software: A guide for infosec and devops Professionals appeared first on Security Boulevard.
Twitter suffers a databreach of phone numbers and email addresses belonging to 5.4 The post Twitter DataBreach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits appeared first on The Shared Security Show.
When it comes to Missouri Governor Mike Parson's explosive reaction to a reporter "hacking" the state's web application, there is an outpouring of public figures, InfoSec professionals, and other tech experts telling the governor what they think. Journalists responsibly sounding an alarm on dataprivacy is not criminal hacking.
When databreaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Still, the top response stood out clearlyprotecting dataprivacy.
TikTok has denied reports that it was breached by a hacking group, after it claimed they have gained access to over 2 billion user records, the Los Angeles school district, the second-largest in the US, suffered a ransomware attack, and details on how one high school in Sydney Australia installed fingerprint scanners at the entrance […].
Scott and Tom talk about the importance of protecting your […] The post The Inefficiency of People-Search Removal Tools, Massive DataBreach Impacting U.S. The post The Inefficiency of People-Search Removal Tools, Massive DataBreach Impacting U.S. Citizens appeared first on Shared Security Podcast.
January 28th is DataPrivacy Day, an international effort to empower individuals and support businesses in the endeavor to respect privacy, safeguard data, and enable trust. This year, the National Cybersecurity Alliance has extended the dataprivacy campaign to be a week-long initiative.
In episode 333 of the Shared Security Podcast, Tom and Scott discuss a recent massive databreach at Ticketmaster involving the data of 560 million customers, the blame game between Ticketmaster and third-party provider Snowflake, and the implications for both companies.
The hosts discuss Apple and Google’s collaboration on a technology called DOLT (Detecting Unwanted Location Trackers), aiming to improve user privacy by detecting Bluetooth trackers like Tiles […] The post New Tracker Warning Features on iPhones & Androids, 2024 Verizon DataBreach Investigations Report appeared first on Shared Security Podcast.
The post Apple Previews Lockdown Mode, Another Marriott DataBreach, Smart Contact Lenses appeared first on The Shared Security Show. The post Apple Previews Lockdown Mode, Another Marriott DataBreach, Smart Contact Lenses appeared first on The Shared Security Show.
The post LastPass DataBreach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint appeared first on The Shared Security Show. The post LastPass DataBreach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint appeared first on The Shared Security Show.
The post Meta’s EU Ad Practices Ruled Illegal, Twitter API DataBreach, Vulnerabilities in Major Car Brands appeared first on The Shared Security Show. The post Meta’s EU Ad Practices Ruled Illegal, Twitter API DataBreach, Vulnerabilities in Major Car Brands appeared first on Security Boulevard.
The post Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner DataBreach appeared first on The Shared Security Show.
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest databreach of protected health information in history. We explore the implications of this significant breach and whether paying ransoms is a viable solution.
A recent databreach of 5.4 million Twitter users and Meta being fined $265 million dollars from a 2021 data leak, and people are fleeing Twitter because of Elon Musk. Are we finally seeing a tipping point in social media? What is the TikTok “Invisible Challenge” and how links to fake “unfilter” software is being […].
Episode 324 features discussions on a significant AT&T databreach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyber risks and measures they can deploy to keep digital operations secure and compliant to dataprivacy regulations.”. billion in premium. But much will rely on regulation.
In the words of Duo Security’s Head of Advisory CISOs Wendy Nather, “This is not a marketing report to toss in your swag bag and ignore …this report will change how we think about running infosec programs.” DataPrivacy Day with a difference. MORE Fines against banks for databreaches more than doubled last year.
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the attacker remote access to their corporate computer, and details about new research that shows that (..)
Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches. In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat.
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a combination of voice calls and phishing that preys on unsuspecting victims.
Much of the reason why I wanted to write this post is because whilst I hate breached organisations not properly investigating an incident, I also hate seeing misattribution of a breach to an innocent party. With the exception of a few outdated fields, the data on my family member is correct.
The post ChatGPT Goes Viral, More Trouble for LastPass, Apple’s New Data Protections appeared first on The Shared Security Show. A chatbot developed by OpenAI, called ChatGPT, has gone viral and is able to mimic human language and speech styles and can interact with users in a conversational way. Attackers broke into a […].
Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an. The post The Business Value of the Social-Engineer Phishing Service appeared first on Security Boulevard.
A Cisco employee was compromised by a ransomware gang using a technique called multi-factor authentication fatigue, an attack on the Signal messenger app’s SMS service Twilio potentially disclosed the phone numbers of 1,900 users, and details on how Facebook and Instagram track what you click on including your web browsing history by using their in-app (..)
In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that has surfaced online.
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor.
We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, potentially holding companies and individuals for ransom. Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack.
How data brokers are selling sensitive mental health data for a few hundred dollars with little attempt to hide identifying information such as names […] The post Twitter’s Paywall 2FA, Mental Health Data for Sale, Meta’s Verified Program appeared first on The Shared Security Show.
Reddit announced that it was the victim of a phishing attack aimed at its employees, resulting in unauthorized access to internal documents, code, and some unspecified business systems. Advice on managing device location-tracking settings to ensure you’re not sharing your location inadvertently.
by […] The post Biden’s National Cybersecurity Strategy, BetterHelp’s FTC Fine, Chick-fil-A DataBreach appeared first on The Shared Security Show. The post Biden’s National Cybersecurity Strategy, BetterHelp’s FTC Fine, Chick-fil-A DataBreach appeared first on Security Boulevard.
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key to forge authentication tokens. A TikTok influencer used a voice cloning app to expose a cheating boyfriend.
By September of 2021, the number of publicly reported databreaches had already surpassed the total of the previous year by 17%. We can expect to see a steep rise in US state-by-state dataprivacy requirements and movement toward a potential federal privacy law in 2022.
In this episode, we discuss the significant databreach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health monitoring by analyzing bodily waste, and the ensuing privacy concerns.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content