We hear stories about the time it takes to weaponize security patches. This test, by Orca Security, tested a different problem. They wanted to know how long it takes hackers to discover secrets that you leave exposed in your cloud environment. They tested a variety of resources from Github to AWS. The good news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Part Time Hackers Get Rich A business email compromise hacking group, based in Israel, is so good that it only needs to work part time. Only targeting large companies and their executives, the average haul for this team is $712,000. The overall average from BEC attacks is only $65,000. Learn their success strategy and avoid […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We are back to pandemic level cyber fear. Security firm Proofpoint says that compared to last year, CISOs are feeling less prepared to cope with cyberattacks and more at risk. Threats are always increasing, data is being ripped off in more ways than we can count, cybersecurity budgets are not what they need to be, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google Adds Dark Web Monitoring to GMail Users A feature that used to be available to paid Google One subscribers will soon be available to all GMail users. Dark web monitoring tells you if your GMail email address is found on the dark web (hint: almost all of them are due to thousands of data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Twitter wants to offer a whole bunch of services under one roof, so expect more of these. But, there are two strategies – best of breed and one throat to choke. Twitter is, apparently, going after the one throat to choke model. In the best of breed model, you pick the best tools you can […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Businesses buy insurance and then they expect the insurance company to pay when they make a claim. Sometimes that happens but when it comes to cyber insurance, too often it does not. But, there are things you can do to improve your odds. First, make sure everyone understands all of the security requirements of your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]