A revolution is occurring as you read this. There has been a huge increase in the adoption of APIs and API-based applications. This surge in API use has opened up many opportunities, alongside a new world of vulnerability, allowing greater connectivity and accessibility, but also posing[...]
According to new research, a rising rate of coronavirus infections has been met with a declining rate of reported cybersecurity breaches. The finding, from the Identity Theft Resource Center (ITRC), shows that publicly reported US data breaches dropped 33% in the first half of 2020 compared with[...]
Credential stuffing is a type of cyberattack where stolen account credentials typically consisting of lists of usernames and/or email addresses and the corresponding passwords (often from a data breach) are used to gain unauthorized access to user accounts through large-scale automated login[...]
New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, according to Snyk.Well known vulnerabilities, such as cross-site scripting, continue to be reported but aren’t impacting[...]
The complexity and size of DDoS attacks in 2019 has increased significantly compared to 2018. A report published by NaWas by NBIP concludes that despite the number of attacks has decreased slightly over 2019, their complexity and size has increased significantly.Slightly fewer DDoS attacks were[...]
Magecart attackers have compromised web shops belonging to large retail chains Claire’s and Intersport and equipped them with payment card skimmers.The compromise of Claire’s online store and that of its sister brand Icing has been flagged by Sansec researchers.The skimmer was served from a[...]
Cybersecurity researchers uncovered a new critical vulnerability affecting the Server Message Block (SMB) protocol that could allow attackers to leak kernel memory remotely, and when combined with a previously disclosed "wormable" bug, the flaw can be exploited to achieve remote code execution[...]
It can’t have escaped everyone's attention, since the move to the cloud the number of data breaches has gone through the roof. In this article, I’m going to run through why this is happening, why workplace policy won’t fix it, and what your organization can do to reduce the risk of being next.
There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout.The report also shows that unmitigated mobile phishing threats could cost organizations with 10,000 mobile devices as much[...]
Our unique positioning on the global market enables us to be at the forefront of every new technology and with that unique expertise we help our clients to quickly and cost effectively choose, test and deploy the best solutions to service their customer base.