Incident Response

Incident Response

Orca Security Traces Cloud Vulnerabilities Back to Code

Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
Security Boulevard

US ‘Strike Force’ Keeps Disruptive Tech From Adversaries

The U.S. Department of Justice (DoJ) and the Department of Commerce launched a “Disruptive Technology Strike Force” to investigate and prosecute criminal violations of U.S. export control laws. The aim is to ...
Security Boulevard

Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability

Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
Security Boulevard

Western Digital Hacked: ‘My Cloud’ Data Dead (Even Local Storage!)

Déjà Vu: Hack of WD systems leads to My Cloud service outage. Owners unable to access files ...
Security Boulevard

Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies

The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...
Security Boulevard

Survey: Reactionary Cybersecurity is Misaligned With Business Goals

A global survey of 409 cybersecurity and IT decision-makers from companies with at least 250 employees suggested that while there is a lot more attention being paid to aligning cybersecurity strategy with ...
Security Boulevard

After Brief Exposure in Public Repo, GitHub Rotated Private SSH Key

In an attempt to get ahead of fallout from the exposure of its private SSH key in a public repository, the software development platform GitHub proactively rotated its host key last week ...
Security Boulevard

Twitter Presses GitHub to Turn Over User Who Leaked Source Code

When Twitter joined the ranks of tech companies whose source code leaked online, it was met with little surprise and a whole lot of unease over what the leak might mean for ...
Security Boulevard