An unprotected database belonging to Chinese e-commerce site Gearbest exposed 1.5 million customer records, including payment information, email addresses and other personal data for customers worldwide, white hat hackers discovered.
Here's free software built by the National Security Agency called Ghidra that reverse-engineers binary application files - all you have to do is install it on your system. So went the pitch from the NSA's Rob Joyce at this year's "Get Your Free NSA Reverse Engineering Tool" presentation at RSA Conference 2019.
It's not enough to detect an attack. To be truly effective, defenders need to capture digital fingerprints and movement through the network. Lastline CEO John DiLullo discusses this level of defense.
In the expanded, virtual enterprise, security leaders face the challenge of defending an ever more complicated attack surface. How can they best understand and mitigate their risks? Kelly White of RiskRecon shares insights.
A funny thing happened on the way to dark web intelligence-gathering: Some organizations began to amass and share a lot of private information, potentially in violation of privacy regulations and industry rules, says Danny Rogers, CEO of Terbium Labs.
It's a common refrain that people are security's weakest link. But Stu Sjouwerman of KnowBe4 has a solution that adds a critical additional layer to address that vulnerability.
A medical software vendor's unsecured fax server leaked patients' medical information, highlighting yet again the importance of vendor risk management.
Web hosting firm XBT/Webzilla's infrastructure was used to attack the U.S. Democratic Party and for 2016 election interference, a former National Security Council official said in a court report filed as part of a since-dismissed defamation lawsuit over the Steele dossier's release.
In the wake of the EU's GDPR and other legislation, privacy suddenly is the hot topic within enterprises and governments alike. A panel of experts discusses the privacy imperative and what it means for security.
Broadcom acquired CA. AlienVault became AT&T Cybersecurity. These are just two of the deals that headlined in 2018. What does the 2019 market hold? Brad Topchick, managing director of Mooreland Partners, shares insights.
Security has the opportunity - or challenge - to help drive digital transformation within the enterprise. Al Ghous of GE Digital describes how security leaders can maximize their influence and avoid potholes.
According to some researchers, up to 61 percent of recent data breaches were a result of a third-party vulnerability. Matan Or-El, CEO of Panorays, discusses the weakest links of supply chain security and how to strengthen them with automated tools.
Operating divisions of the Department of Health and Human Services need to shore up security controls - including access controls and software patching - to more effectively detect and prevent cyberattacks, according to a new federal watchdog report.
Facebook's data deals continue to be probed. A criminal investigation of Facebook by federal prosecutors in New York has resulted in records being subpoenaed "from at least two prominent makers of smartphones and other devices," the New York Times reports.
A closely held type of point-of-sale malware, DMSniff, is spreading further while another, GlitchPOS, has also emerged. Despite a surfeit of stolen payment card details on the black market, efforts to steal more continue, highlighting the continuing challenges around card security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.