720-891-1663

How Long Did It Take Hackers to Find Exposed Secrets – As Little as 2 Minutes

We hear stories about the time it takes to weaponize security patches. This test, by Orca Security, tested a different problem. They wanted to know how long it takes hackers to discover secrets that you leave exposed in your cloud environment. They tested a variety of resources from Github to AWS. The good news is […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for the Week Ending May 19, 2023

Part Time Hackers Get Rich A business email compromise hacking group, based in Israel, is so good that it only needs to work part time. Only targeting large companies and their executives, the average haul for this team is $712,000. The overall average from BEC attacks is only $65,000. Learn their success strategy and avoid […]

Continue reading → [DISPLAY_ACURAX_ICONS]

68% of CISOs in 16 Countries Fear Cyberattack in Next 12 Months – What About You?

We are back to pandemic level cyber fear. Security firm Proofpoint says that compared to last year, CISOs are feeling less prepared to cope with cyberattacks and more at risk. Threats are always increasing, data is being ripped off in more ways than we can count, cybersecurity budgets are not what they need to be, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for the Week Ending May 12, 2023

Google Adds Dark Web Monitoring to GMail Users A feature that used to be available to paid Google One subscribers will soon be available to all GMail users. Dark web monitoring tells you if your GMail email address is found on the dark web (hint: almost all of them are due to thousands of data […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Five Ways to Maximize Cyber Insurance Benefits

Businesses buy insurance and then they expect the insurance company to pay when they make a claim. Sometimes that happens but when it comes to cyber insurance, too often it does not. But, there are things you can do to improve your odds. First, make sure everyone understands all of the security requirements of your […]

Continue reading → [DISPLAY_ACURAX_ICONS]