Tag: Identity
-
Impact of organizational structure on ransomware outcomes: Where does your org fit in?
How is your security team organized, and does it affect the quality of cybersecurity outcomes? If a recent report from cybersecurity firm …
-
Phishing attack compromises LA County Health Services data
Individuals receiving healthcare across Los Angeles had their personal and health data compromised following a successful phishing attack …
-
Microsoft credentials targeted by phishing campaign using Autodesk Drive
Hacked email accounts were used by threat actors to facilitate a phishing campaign that involves the use of Autodesk Drive-hosted PDF …
-
Are PayPal’s Executives Looking Towards Re-Inventing the Product’s Identity?
PayPal has been around for a very long time, and it has served millions of people from around the world through its money-transfer …
-
Active adversary report: Ransomware hit a ceiling, but security teams at risk for more pain
despite a pause in the rise of ransomware, organizations are failing to take the steps necessary to adequately defend themselves against …
-
New Five Eyes AI security guidelines unveiled
Mounting artificial intelligence-related cybersecurity risks have prompted cybersecurity agencies from the Five Eyes countries, which …
-
Total Cyber Command hunt forward missions disclosed for the first time
Hunt forward missions deployed by the Cyber Command last year were noted by its head Gen. Timothy Haugh to have totaled 22 across 17 …
-
Identity security and user experience: Where balance can be achieved
A corporate security team investigating an incident narrowed the exposure point to an executive’s laptop. The executive vehemently denied …
-
DDoS attacks spike in first quarter
Fifty percent more distributed denial-of-service attacks have been launched by threat actors during the first quarter of 2024 over the same …
-
How AI-powered IAM can bolster security
The intersection of artificial intelligence (AI) and identity and access Management (IAM) has reshaped how organizations approach …
-
Why identity has become a Trojan horse, and what to do about it
IT security teams layer in solutions to prevent threat actors from infiltrating networks, devices, and applications. But all those measures …
-
Attack against Space-Eyes claimed by IntelBroker
Hackread reports that Miami-based geospatial intelligence company Space-Eyes was claimed to have been compromised by IntelBroker, which …
●●●