This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Given the interest after my pointing out a couple of little differences in the US compared to the rest of the world last week, after the usual tech and infosec intro this week I decided to focus a big whack of this week's video on what some of differences look like. So yeah, business as usual on the internet!
When the Ashley Madison databreach occurred in 2015, it made headline news around the world. Not just infosec headlines or tech headlines, but the headlines of major consumer media the likes my mum and dad would read.
In episode 333 of the Shared Security Podcast, Tom and Scott discuss a recent massive databreach at Ticketmaster involving the data of 560 million customers, the blame game between Ticketmaster and third-party provider Snowflake, and the implications for both companies.
I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. com, which was fed by pig butchering scams. Uber blames LAPSUS$ for the intrusion.
Since 2017, host Jack Rhysider has investigated some of the most noteworthy stories related to the darkside of the internet, specifically hacking, databreaches, and cybercrime. It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Malicious Life. 5 stars, 670 ratings.
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest databreach of protected health information in history. We explore the implications of this significant breach and whether paying ransoms is a viable solution.
About 25% of all databreaches are caused by human error. Here’s an example of how a phishing email can spread ransomware through your network: The cost of a databreach can be very high, and preventing phishing attacks helps your business to avoid financial and reputational damages.
There’s been a lot of weird and frankly bizarre attacks over the course of 2022, nestled in amongst the usual ransomware outbreaks and databreaches. It’s time to forget about nation state attacks and the nagging sensation that every single piece of data ever created has ended up on a TOR site somewhere.
This is what prompted the FBI to issue a warning about the $43B impact of Business Email Compromise (BEC) scams. The growth in digital attack surfaces has added a new dimension to traditional data protection approaches in terms of compliance with emerging regulations. Cyber Resilience planning puts focus on recovery readiness.
Many wireless phone providers have introduced spam protections to keep their customers from falling victim to vishing scams. You can also register your number on the federal Do Not Call list, but it doesn’t seem to have any actual effect on the number of scam calls received. Vishing Defenses. But it can’t just be a one-time thing.
Episode 324 features discussions on a significant AT&T databreach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist.
For the past two years, it’s been easy to brush off data privacy risks for the benefit of being able to access and/or purchase anything we needed without having to leave the comfort or safety of our homes. But in the rush to transition online, we were all made more vulnerable to cyber infiltrations and scams than ever before.
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a combination of voice calls and phishing that preys on unsuspecting victims.
In February 2024, ALPHV conducted an exit scam against its affiliates and disbanded, leaving them searching for new partners. Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging. However, be aware that callbacks are not resistant to SIM-swapping attacks.
Databreaches and cybersecurity threats were at an all-time high this past year. Cybersecurity programs that educate your entire team on general information security tactics – including recognizing and addressing phishing scams – are essential.
Their CEO later explained it very succinctly: "We did have a reporter, try to contact us multiple times last week, you don't respond to some random person about a databreach. — Michael Kan (@Michael_Kan) February 28, 2017 Problem is, random people are precisely the sorts of people that find databreaches.
In February 2024, ALPHV conducted an exit scam against its affiliates and disbanded, leaving them searching for new partners. Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging. However, be aware that callbacks are not resistant to SIM-swapping attacks.
But wait, there’s more to this […] The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Shared Security Podcast. The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Security Boulevard.
Cybersecurity programs that educate your entire team on general information security tactics – including recognizing and addressing phishing scams – are essential. Some of the largest databreaches in the past year have been carried out by RaaS providers REvil and Darkside. Ransomeware-as-a-Service. In the U.S.,
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content