Fast-fashion clothing giant Shein has been fined $1.9 million by the New York state attorney general for multiple failings tied to a massive 2018 data breach, including substandard password security as well as failing to alert users or force password resets in a timely manner.
Emails encrypted through Microsoft Office are vulnerable to attacks that can reveal the original content of messages due to shortcomings in the protocol, says WithSecure security researcher Harry Sintonen. Microsoft says it may finally abandon its use of the Electronic Code Book algorithm.
Cybersecurity firm Eset says its spotted multiple hacks in Israel coming from a Lebanese threat group dubbed Polonium that's affiliated with Iran. The group employs custom-coded backdoors that use a slew of cloud storage accounts to handle command and control.
A phishing and fraud prevention vendor has bought a startup founded by Qualys' longtime engineering leader to help organizations more effectively discover and monitor assets. Red Sift says its purchase of Hardenize will help customers assess the security of their digital asset inventory.
"Good enough" security used to be just that for many boards and senior leaders. But in today's dynamic threat landscape, where digital identities are under siege, the concept of identity security has risen to be a business essential. Matt Mills of SailPoint tells why this is a game-changer.
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.
The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.
Immersive Labs completed a funding round just weeks after laying off 10% of its workforce to cover more developer languages and safeguard Azure and Google Cloud. The Ten Eleven Ventures-led funding will help Immersive Labs expand its coverage from frontline cybersecurity staff to development teams.
One zero-day down but two Microsoft Exchange zero-days to go in this month's dose of patches from the Redmond, Washington computing giant. Microsoft fixed a COM+ flaw being exploited in the wild but for now is relying on workarounds for two known email server bugs.
Lloyd's of London says it has fully restored network services and that an investigation uncovered no evidence of a compromise. The insurance and reinsurance marketplace giant took systems offline last week after detecting what it called "suspicious activity."
In Part 1 of a three part-video series, Andrew Abel, a cybersecurity and zero trust consultant and CyberEdBoard member, and Chase Cunningham, CSO at Ericom Software, share tips on how to create an identity strategy within the broader context of zero trust.
Thoma Bravo has deepened its presence in the identity space, agreeing to buy ForgeRock for $2.3 billion just months after inking deals with Ping Identity and SailPoint. The deals mean that Thoma Bravo has spent $12 billion building a platform with expertise around CIAM and identity governance.
European lawmakers advanced legislation for a continentwide framework for digital identity after agreeing to provisions assuring online anonymity and local storage of digital documents. The European Commission first proposed in 2021 a framework for a digital identity accepted in all member states.
Two Australian regulatory agencies are investigating the telecommunications company behind the country's second-largest data breach, affecting approximately 10 million people. Optus could face millions of dollars in fines from probes into the firm's privacy and data retention practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.