T-Mobile disclosed Thursday that hackers had access for approximately six weeks to an application programming interface that exposed customer data including names, birthdates and email addresses. No payment information or passwords were part of the breach, the company said.
The growth in cyberattacks and data breaches has impacted both government agencies and enterprises across the globe — forcing the regulatory landscape to change. Compliance has become a top issue for organizations, yet most are not adequately addressing the need of API security. APIs are gaining traction both for...
Researchers have found that Kinsing malware gained access to Kubernetes servers by exploiting misconfigured and exposed PostgreSQL servers. The threat actors gained access by exploiting weakly configured PostgreSQL containers and vulnerable container images.
Expect the recently leaked database containing over 200 million Twitter records to be an ongoing resource for hackers, fraudsters and other criminals operating online, experts warn. Though 98% of the email addresses have appeared in prior breaches, bad actors can merge databases and do more damage.
Software vulnerabilities installed by luxury car manufacturers including Ferrari, BMW, Rolls Royce and Porsche that could allow remote attackers to control vehicles and steal owners' personal details have been fixed. Cybersecurity researchers uncovered the vulnerabilities while vacationing.
A member of a criminal data breach forum that tried to sell the email addresses of 400 million Twitter users to CEO Elon Musk last month has now posted the stolen data for anyone to download for free. The 63GB of data includes names, handles, creation dates, follower counts and email addresses.
If you use APIs today – which you very likely do if you are leveraging cloud-native technology in any way – mastering the concepts discussed in the following pages is crucial for ensuring that you can balance the benefits of APIs with security challenges. Indeed, avoiding APIs is simply not realistic for most...
Phishing and other socially-engineered schemes are going to get bolder, the attack surface is only going to get bigger, and enterprises everywhere are going to have to focus more on building cyber resilience. These are among the New Year's predictions from Zoom's new CISO, Michael Adams.
Information Security Media Group asked some of the industry's leading cybersecurity experts about the trends to watch in 2023. Responses covered a variety of emerging threats and evolving trends affecting security technologies, leadership and regulation. Here is a look at the year ahead.
A member of a criminal data breach forum says he's selling email addresses and phone numbers of 400 million Twitter users. If verified, the data breach would be a further blow to Twitter and its beleaguered chief executive as regulators increase pressure over the firm's security practices.
Observability is not necessarily a commonly understood term in cybersecurity circles. What exactly does it mean in context, and how does it relate to security? Jackie McGuire of Cribl discusses the observability pipeline and how best to build a solution.
It's been another watershed year for cybersecurity practitioners and leaders. How would one describe the state of security and data as we head into 2023? Jackie McGuire of Cribl weighs in with her observations and predictions for the new year.
APIs increasingly drive everything from web and mobile application development to IoT devices since they streamline communication among disparate systems, says Synack CEO Jay Kaplan. But testing the efficacy and security of APIs remains challenging given the size of API endpoints.
Approov has landed a new CEO to help the mobile security upstart expand in the United States and capture more healthcare and financial services customers. The Silicon Valley-based company has captured high-profile European customers such as BMW from its development center in Scotland.
Serverless adoption is rising rapidly. New tools and features for serverless frameworks are created frequently. Recently, AWS released a new feature called Lambda function URLs. This feature enables configuring HTTP endpoints, to directly invoke lambda functions, without going through AWS API Gateway and other...