Cloud Security

ISS World Hit with Malware Attack that Shuts Down Global Computer Network
Posted on Friday February 21, 2020

The incident cut off access to e-mail and shared IT services across customer sites of the multinational Denmark-based facility-management firm.

FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware
Posted on Wednesday February 12, 2020

Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.

Estée Lauder Exposes 440M Records, with Email Addresses, Network Info
Posted on Tuesday February 11, 2020

Middleware data was exposed, which can create a secondary path for malware through which applications and data can be compromised.

Docker Registries Expose Hundreds of Orgs to Malware, Data Theft
Posted on Monday February 10, 2020

Misconfigured Docker registries could leak confidential data, lead to a full-scale compromise and interrupt the business operations.”

Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs
Posted on Friday February 07, 2020

RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.

Dropbox Passes $1M Milestone for Bug-Bounty Payouts
Posted on Thursday February 06, 2020

The file-sharing service also disclosed details of past notable bugs for the first time.

Microsoft Leaves 250M Customer Service Records Open to the Web
Posted on Wednesday January 22, 2020

The trove of information is potentially a scammer's bonanza.

A Practical Guide to Zero-Trust Security
Posted on Wednesday January 15, 2020

There are five different pillars to implement when moving to a modern, zero-trust security model.

Public Bug Bounty Takes Aim at Kubernetes Container Project
Posted on Tuesday January 14, 2020

The cloud-focused program will pay out $10,000 as its top reward.

2020 Cybersecurity Trends to Watch
Posted on Tuesday December 31, 2019

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.