FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

4 Ways Hackers use Social Engineering to Bypass MFA

When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it's important to remember that MFA isn't foolproof. It can be bypassed, and it often is.  If a password is compromised, there are several options

Key Cybersecurity Tools That Can Mitigate the Cost of a Breach

IBM's 2023 installment of their annual "Cost of a Breach" report has thrown up some interesting trends. Of course, breaches being costly is no longer news at this stage! What’s interesting is the difference in how organizations respond to threats and which technologies are helping reduce the costs associated with every IT team’s nightmare scenario.Β  The average cost of a breach rose once again

Local Governments Targeted for Ransomware – How to Prevent Falling Victim

Regardless of the country, local government is essential in most citizens' lives. It provides many day-to-day services and handles various issues. Therefore, their effects can be far-reaching and deeply felt when security failures occur. In early 2023, Oakland, California,Β fell victim to a ransomware attack. Although city officials have not disclosed how the attack occurred, experts suspect a

Cybercrime (and Security) Predictions for 2023

Threat actors continue to adapt to the latest technologies, practices, and even data privacy lawsβ€”and it's up to organizations to stay one step ahead by implementing strong cybersecurity measures and programs.Β  Here's a look at how cybercrime will evolve in 2023 and what you can do to secure and protect your organization in the year ahead.Β  Increase in digital supply chain attacksΒ  With the

What the CISA Reporting Rule Means for Your IT Security Protocol

The newΒ Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA)Β requires CISA to create rules regarding cyber incident reporting by critical infrastructure organizations. The RFI and hearings precede a Notice of Proposed Rulemaking (NPRM) that CISA must publish sooner thanΒ 24 monthsΒ from the enactment of CIRCIA, which the President signed into lawΒ in March. The sessions and

Shopify Fails to Prevent Known Breached Passwords

A recent report revealed that ecommerce provider,Β Shopify uses particularly weak password policiesΒ on the customer-facing portion of its Website. According to the report, Shopify's requires its customers to use a password that is at least five characters in length and that does not begin or end with a space.Β  According to the report, Specops researchers analyzed a list of a billion passwords

What the Zola Hack Can Teach Us About Password Security

Password security is only as strong as the password itself. Unfortunately, we are often reminded of the danger of weak, reused, and compromised passwords with major cybersecurity breaches that start with stolen credentials. For example, in May 2022, the popular wedding planning site, Zola, was the victim of a significant cybersecurity breach where hackers used an attack known asΒ credential
❌