The need for collaborative work tools increased with faster internet speeds and more computer users. This led to the emergence of companies offering online work applications, like Salesforce and their “SaaS” model. Currently, most enterprise software is cloud-based, with over 94% of corporations using cloud software and storing 60% of their data in cloud data […]
Massachusetts’ second-largest health insurer, Point32Health, fell victim to a ransomware attack, potentially compromising sensitive personal and health information of current and former members. The incident, affecting its Harvard Pilgrim Health Care program, was detected on April 17, with the compromised data including addresses, phone numbers, birthdates, Social Security numbers, medical history, treatment details, dates of […]
The ever-present threat posed by cybercriminals is a stark reality that businesses must constantly face, remaining vigilant and informed about the latest attack trends. Safeguarding your data and systems should be a top priority, and the question arises: should you rely on an in-house security team or opt for managed IT security services to ensure […]
Cybersecurity is the practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft. In today’s digital age, where technology permeates almost every aspect of our lives, cybersecurity plays a crucial role in ensuring the confidentiality, integrity, and availability of information. Cybersecurity encompasses a wide range of practices and technologies designed to […]
Google is unveiling new updates to enhance multi-cloud networking with Cross-Cloud Interconnect and Private Service Connect improvements. With Cross-Cloud Interconnect, organizations can establish secure connections between Google Cloud and other public cloud platforms like AWS, Microsoft Azure, and Oracle Cloud Infrastructure. This enables running applications on multiple clouds, hosting SaaS in a multi-cloud environment, and […]
Researchers from Tencent Labs and Zhejiang University have unveiled BrutePrint, a new attack that exploits fingerprint vulnerabilities in modern smartphones to bypass user authentication and gain control of the devices. The attack relies on brute-forcing fingerprints through an unlimited number of attempts until a match is found. By exploiting two zero-day vulnerabilities, Cancel-After-Match-Fail (CAMF) and […]
Prominent technology provider, ScanSource, has confirmed a ransomware attack that disrupted its systems, operations, and customer portals. The US-based company offers cloud services, SaaS connectivity, and specialized solutions like point of sale (PoS) and security. Reports from customers unable to access ScanSource’s portals raised concerns of a cyberattack, later confirmed by the company. Following the […]
Attack surface management (ASM) is often overlooked in securing cloud computing environments, despite its critical importance. Many cloud security training programs and certifications tend to focus on specific tools and trends, neglecting the comprehensive approach that ASM offers. However, with attackers becoming more sophisticated and leveraging advanced AI technology, it is crucial for enterprises to […]
Cloud security remains a top concern for about 40% of professionals, as revealed by a survey by cybersecurity vendor Delinea at the 2023 RAS Conference. Cloud environments are attractive targets due to their vast data storage, making cloud providers susceptible to cyberattacks. Mitigating these risks requires a holistic approach, recognizing that no single control can […]
TSA tests facial recognition to streamline airport security, allowing passengers to proceed through checkpoints by inserting an ID card and looking into a camera. The pilot project is currently implemented in 16 airports, offering voluntary participation. Critics raise concerns about biases in facial recognition algorithms and privacy implications. TSA emphasizes the pilot’s accuracy, privacy measures, […]