Please turn on your JavaScript for this page to function normally.
CircleCI
CircleCI breach post-mortem: Attackers got in by stealing engineer’s session cookie

The attackers who pulled off the recent breach of continuous integration and continuous delivery (CI/CD) platform maker CircleCI got in by compromising an engineer’s …

thief
How an effective fraud prevention strategy can force fraudsters to invest more in their attacks

Since the early stages of the pandemic, account takeover fraud (ATO) has significantly transformed, quickly becoming one of the fastest-growing cybersecurity threats with 22% …

online shop owned
API abuses and attacks create new challenges for retailers

Imperva releases The State of Security Within eCommerce 2022 report, a 12-month analysis by Imperva Threat Research of cybersecurity threats targeting the retail industry. …

Dropbox GitHub
130 Dropbox code repos plundered after successful phishing attack

Dropbox has suffered a data breach, but users needn’t worry because the attackers did not gain access to anyone’s Dropbox account, password, or payment information. …

mask
Emotional and physical effects of identity theft are on the rise

The Identity Theft Resource Center (ITRC) has published a research that shows nearly 40 percent of ITRC victims say their personal information was stolen, compromised or …

skull binary
Shadow APIs hit with 5 billion malicious requests

Cequence Security released its first half 2022 report titled, “API Protection Report: Shadow APIs and API Abuse Explode.” Chief among the findings was approximately 5 billion …

identity theft
How does identity crime affect victims?

The Identity Theft Resource Center (ITRC) has published a research that shows nearly 40 percent of ITRC victims say their personal information was stolen, compromised or …

Uber
Uber says Lapsus$ gang is behind the recent breach

Uber has confirmed that the recent breach of its systems started with a compromised account belonging to a contractor. “It is likely that the attacker purchased the …

LastPass
LastPass breach: Source code, proprietary tech info stolen

“An unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code …

How attackers abuse Microsoft MFA
How attackers use and abuse Microsoft MFA

Microsoft has been pushing for the use of multi-factor authentication (MFA) to thwart attackers for many years. But threat actors are keeping up with the increasing enterprise …

identity theft
Identity crimes reach all-time high

The Identity Theft Resource Center (ITRC) has published a report that looks at the identity crimes committed against individuals as reported by the victims of those crimes. In …

DigitalOcean
DigitalOcean customers affected by Mailchimp “security incident”

A recent attack targeting crypto-related users of Mailchimp has ended up affecting users of cloud infrastructure provider DigitalOcean, the latter company has announced on …

Don't miss

Cybersecurity news