A whopping almost 32 million records and around 110 TB of data belonging to tech users from Trackman were left exposed to the internet. The database exposed user names, email addresses, device information, IP addresses, and security tokens. They were…
Tag: Information Security Buzz
The Hidden Price of DevSecOps: How Security Tasks Are Sapping Developer Productivity and Jeopardizing Competitive Edge
Developers are spending significantly more time, and companies are spending 28K per developer each year on security-related tasks, such as manual application scan reviews, context switching, and secrets detection, among other things. This was revealed by JFrog, the Liquid Software company…
Palo Alto Networks Warns of Exploitable Firewall Hijack Vulnerabilities
Palo Alto Networks has issued an urgent advisory for its customers following the discovery of multiple critical vulnerabilities in its Expedition tool, which assists with firewall configuration migration. The vulnerabilities are as follows: CVE-2024-9463 has a score of 9.9. It’s…
No Silver Bullet, Just Smarter Security: More Expert Tips for Cyber Defense
We had such an overwhelming response to our first article, which shared industry expert opinions during Cybersecurity Awareness Month, that we’ll be publishing another few articles with more expert insights over the next few weeks. Following on with the theme…
Disinformation Campaign Targets Moldova Ahead of Presidential Elections and EU Membership Referendum
A cyber-enabled disinformation campaign, dubbed Operation MiddleFloor, is targeting Moldova’s government and educational sectors, according to Check Point Research. The campaign began in early August and appears to have been aimed at influencing the country’s presidential elections on 20 October,…
Password Basics: Why Mastering Fundamentals Is Crucial in Today’s Complex Cybersecurity Landscape
It’s often said, but worth repeating: In cybersecurity, we simply cannot afford to neglect the basics. Focus has increasingly shifted to the ‘scarier’ threats posed by Artificial Intelligence (AI) and other disruptive technologies, and many have been overlooking the basics…
Report Highlights Escalating Security Challenges Amid Swift AI Adoption
In the dynamic world of software development, security challenges are advancing at a rapid pace. Black Duck’s 2024 “Global State of DevSecOps” report examines the evolving trends and concerns in application security, drawing insights from a survey of over 1,000…
Lego Hacked by Crypto-Scammers
Early Saturday morning, Lego’s website briefly fell victim to a crypto scam that advertised a fake Lego coin token. The scam appeared as a banner on the homepage, positioned below an advertisement for Lego’s new Fortnite collaboration, which features building…
From Zero Trust to Full Trust: How Remote Browser Isolation Shields Against Emerging Threats
Cyber threats are ubiquitous and constantly evolving and companies are in dire need of robust defense mechanisms to protect their digital assets and ensure business continuity. Remote Browser Isolation (RBI) technology has emerged as a pivotal solution, offering a unique…
American Water Hit by Cyberattack
American Water, the largest publicly traded water and wastewater utility in the United States, has had to shut down certain systems following a cyberattack. The attack impacted the company’s online customer portal, MyWater, and paused billing services. In its 8-K…