Identity and Access Management
How Threat Hunting can Strengthen Your Cybersecurity Posture
Threat hunting allows organizations to delve deeper into their networks, identifying hidden threats that traditional security measures might miss ...
What Happens in Vegas: MGM Resorts ‘Ransomware’ Attack
You’re welcome to it. Not happening in Vegas: 12 hotels and casinos—nor in many more elsewhere, neither ...
‘BLASTPASS’ iPhone Exploit — Apple Asleep at the Switch
Zero click, zero day, zero clue: Yet another iOS zero-day lets NSO’s Pegasus “mercenary spyware” cause chaos ...
Google Kills 3rd-Party Cookies — but Monopolizes AdTech
Firefox looking good right now: “Privacy Sandbox” criticized as a proprietary, hypocritical, anti-competitive, self-serving contradiction ...
This SUCKS: ‘Cars Are a Privacy Nightmare,’ Mozilla Fumes
IoT cars considered harmful: Own a car? Care about your privacy? Mozilla Foundation has bad news for you ...
Sourcegraph’s Shocking Screwup: Private Secrets in Public Repo
Credentials create crisis: AI source code navigation LLM leaks PII after DevOps SNAFU ...
BadBazaar: Chinese Spyware Shams Signal, Telegram Apps
After sneaking into Google and Samsung app stores, “GREF” APT targets Uyghurs and other PRC minorities ...
Did Russia Hack Poland’s Trains? MSM Says Yes, but … Well, You Decide
Train Phreaking: It depends what you mean by “hack” (and by “Russia”) ...
What This Year’s Data Breaches Reveal About Identity
These key takeaways for end users, application developers and security practitioners can help stop identity-based breaches ...