Incident Response
Orca Security Traces Cloud Vulnerabilities Back to Code
Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
US ‘Strike Force’ Keeps Disruptive Tech From Adversaries
The U.S. Department of Justice (DoJ) and the Department of Commerce launched a “Disruptive Technology Strike Force” to investigate and prosecute criminal violations of U.S. export control laws. The aim is to ...
TikTok Abused Kids’ Data — UK Fines it $16 Million
$8.50 per child: UK regulator punishes TikTok at 5.5% of revenue. Says app illegally tracked children ...
Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability
Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
Western Digital Hacked: ‘My Cloud’ Data Dead (Even Local Storage!)
Déjà Vu: Hack of WD systems leads to My Cloud service outage. Owners unable to access files ...
Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies
The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...
Survey: Reactionary Cybersecurity is Misaligned With Business Goals
A global survey of 409 cybersecurity and IT decision-makers from companies with at least 250 employees suggested that while there is a lot more attention being paid to aligning cybersecurity strategy with ...
After Brief Exposure in Public Repo, GitHub Rotated Private SSH Key
In an attempt to get ahead of fallout from the exposure of its private SSH key in a public repository, the software development platform GitHub proactively rotated its host key last week ...
Twitter Presses GitHub to Turn Over User Who Leaked Source Code
When Twitter joined the ranks of tech companies whose source code leaked online, it was met with little surprise and a whole lot of unease over what the leak might mean for ...
Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites
UK National Crime Agency nips it in the bud: Aims to scare straight naughty DDoS kiddies ...