FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WIRED

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location

By: Joseph Cox β€” January 9th 2025 at 21:05
A hack of location data company Gravy Analytics has revealed which apps areβ€”knowingly or notβ€”being used to collect your information behind the scenes.
☐ β˜† βœ‡ WIRED

Inside the Dark World of Doxing for Profit

By: Matt Burgess β€” August 7th 2024 at 23:20
From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problemβ€”it’s getting more extreme.
☐ β˜† βœ‡ The Hacker News

4-Step Approach to Mapping and Securing Your Organization's Most Critical Assets

By: The Hacker News β€” May 28th 2024 at 11:12
You’re probably familiar with the term β€œcritical assets”. These are the technology assets within your company's IT infrastructure that are essential to the functioning of your organization. If anything happens to these assets, such as application servers, databases, or privileged identities, the ramifications to your security posture can be severe.  But is every technology asset considered
☐ β˜† βœ‡ WIRED

A Leak of Biometric Police Data Is a Sign of Things to Come

By: Matt Burgess β€” May 23rd 2024 at 16:00
Thousands of fingerprints and facial images linked to police in India have been exposed online. Researchers say it’s a warning of what will happen as the collection of biometric data increases.
☐ β˜† βœ‡ The Hacker News

New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs

By: The Hacker News β€” May 17th 2024 at 11:29
A new report from XM Cyber has found – among other insights - a dramatic gap between where most organizations focus their security efforts, and where the most serious threats actually reside. The new report, Navigating the Paths of Risk: The State of Exposure Management in 2024, is based on hundreds of thousands of attack path assessments conducted by the XM Cyber
☐ β˜† βœ‡ The Hacker News

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

By: The Hacker News β€” April 29th 2024 at 10:54
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many
☐ β˜† βœ‡ The Hacker News

Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

By: The Hacker News β€” April 10th 2024 at 09:02
We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity Threat Exposures (ITEs) are like secret tunnels for hackers – they make your security way more vulnerable than you think. Think of it like this: misconfigurations, forgotten accounts, and old settings are like cracks in your digital fortress walls. Hackers
☐ β˜† βœ‡ The Hacker News

CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management

By: The Hacker News β€” March 12th 2024 at 11:07
In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for ways to continuously reduce risk across your environment while making significant and consistent improvements to security posture, in our opinion, you probably want to consider establishing a Continuous Threat Exposure
☐ β˜† βœ‡ The Hacker News

What is Exposure Management and How Does it Differ from ASM?

By: Newsroom β€” March 5th 2024 at 10:55
Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility and flexibility that cloud environments provide, the mid-market is predominantly running in a hybrid state, partly in the cloud but with some on-prem assets. While there has been a bit of a backswing against the pricing and lock-in presented when using
☐ β˜† βœ‡ WIRED

A Spy Agency Leaked People's Data Onlineβ€”Then the Data Was Stolen

By: Matt Burgess β€” November 16th 2023 at 11:00
The National Telecommunication Monitoring Center in Bangladesh exposed a database to the open web. The types of data leaked online are extensive.
☐ β˜† βœ‡ WIRED

The Twisted Eye in the Sky Over Buenos Aires

By: Karen Naundorf β€” September 13th 2023 at 10:00
A scandal unfolding in Argentina shows the dangers of implementing facial recognitionβ€”even with laws and limits in place.
☐ β˜† βœ‡ WIRED

Unmasking Trickbot, One of the World’s Top Cybercrime Gangs

By: Matt Burgess, Lily Hay Newman β€” August 30th 2023 at 17:37
A WIRED investigation into a cache of documents posted by an unknown figure lays bare the Trickbot ransomware gang’s secrets, including the identity of a central member.
☐ β˜† βœ‡ The Hacker News

Close Security Gaps with Continuous Threat Exposure Management

By: The Hacker News β€” July 7th 2023 at 10:37
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and networks. They are hindered by a lack of open-source intelligence and powerful technology required for proactive, continuous, and effective discovery and protection of their systems, data, and assets. As advanced threat actors constantly search for easily
☐ β˜† βœ‡ Naked Security

Serious Security: Verification is vital – examining an OAUTH login bug

By: Paul Ducklin β€” May 30th 2023 at 16:59
What good is a popup asking for your approval if an attacker can bypass it simply by suppressing it?

☐ β˜† βœ‡ The Hacker News

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

By: The Hacker News β€” May 29th 2023 at 11:47
If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day. In this article, we'll look at another trending acronym – CTEM, which stands for Continuous Threat Exposure Management – and the often-surprising challenges that come
☐ β˜† βœ‡ WIRED

American College of Pediatricians Leak Exposes 10,000 Confidential Files

By: Dell Cameron, Dhruv Mehrotra β€” May 2nd 2023 at 19:53
A Google Drive left public on the American College of Pediatricians’ website exposed detailed financial records, sensitive member details, and more.
❌