Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Salt Labs exposes a new vulnerability in popular OAuth framework, used in hundreds of online services

This post is the second in a series describing OAuth implementation issues that put companies at risk. We create these posts to share rich technical details, drawn from real-world use cases, to educate the broader industry on the nature of these errors, their potential impact, and how to avoid them to better protect API ecosystems.

DigiCert Code Signing Changes: New Private Key Storage & API Modifications

Beginning on June 1, 2023, at 00:00 UTC, industry standards will mandate that private keys for code signing certificates must be stored on hardware that meets specific security certifications such as FIPS 140 Level 2, Common Criteria EAL 4+, or an equivalent standard. This requirement applies to all new code signing certificate requests and requests for renewal and reissue of existing certificates.

ChatGPT Reveals Top 5 Cybersecurity Concerns for Businesses

Welcome to a special edition of Razorwire, where I had the pleasure of interviewing AI language model, ChatGPT. Our discussion revolved around various topics related to information security and cybersecurity. ChatGPT shared valuable insights on how AI can assist in securing organisations against cyber attacks but also emphasised that it should be considered just one tool in a broader cybersecurity strategy. We delved into the future of cybersecurity, key technologies for a defence in depth approach, and the advantages of continuous penetration testing.

Greatest Threats to Businesses Today: Insights by ChatGPT

Discover the prevailing threats that pose a constant challenge to businesses in today's ever-evolving world. Join ChatGPT as we explore the diverse array of threats faced by businesses and uncover the most significant among them. While the nature of the threat may differ based on factors such as industry and business size, several common threats prevail across the board. Cybersecurity threats, including hacking, malware, and ransomware attacks, have reached unprecedented levels of sophistication, constituting a substantial menace to businesses.

More Than Half of all Email-Based Cyberattacks Bypass Legacy Security Filters

New data shows that changes in cybercriminals’ phishing techniques are improving their game, making it easier to make their way into a potential victim user’s inbox. I recently wrote about how 12% of all email threats were getting all the way to the inbox. But new data from cybersecurity vendor Armorblox’s 2023 Email Security Threat Report shows that the number is much higher, depending on the security solutions in place.

BatLoader Malware is Now Distributed in Drive-By Attacks

Malign persuasion can take many forms. We tend to hear the most about phishing (malicious emails) or smishing (malicious texts). Other threats are also worth some attention, like the risk of drive-by attacks. One current drive-by campaign is being run by the operators of BatLoader, a malware strain that establishes initial entry and persistence, and then can be used to distribute a range of other malicious code that loots affected systems and networks of valuable data, including funds.

Financial Fraud Phishing Attacks Increase 72% In One Year; Financial Industry Takes the Brunt

With attackers knowing financial fraud-based phishing attacks are best suited for the one industry where the money is, this massive spike in attacks should both surprise you and not surprise you at all. When you want tires, where do you go? Right – to the tire store. Shoes? Yup – shoe store. The most money you can scam from a single attack?

EP 28 - Safeguarding Data in the Cloud

In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information.