Another one bites the dust: goodbye Joker’s Stash. What’s next? Last week DarkMarket, the second largest dark web marketplace, was shut down by law enforcement in Europe. This takedown is the result of increasing joint efforts to take down dark … Read More
Technical leakage
Malicious Actors Show Little Interest in Automotive Source Code Leak
Malicious Actors Show Little Interest in Automotive Source Code Leak Technical data leakage strikes again, this time affecting a major manufacturer in the automotive industry. Bleeping Computer reported this week that a misconfigured Git server has leaked source code from … Read More
U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network
U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network Recent events at the Capitol in Washington D.C. were condemned for their impact on the democracy of the United States. What was much less discussed, however, is … Read More
Our Take on the Top 5 Predictions for 2021
Our Take on the Top 5 Predictions for 2021 Every December, analysts make predictions about the key events in the following months. These lists range from the most obvious (ex. ransomware will be a big risk in the next 12 … Read More
Leaked Spotify passwords may expose your business to credential stuffing attacks
Leaked Spotify passwords may expose your business to credential stuffing attacks This past year has been tough for most enterprises. While some industries appear more targeted than others by malicious actors, the media and entertainment industry has definitely felt the … Read More
Open source developers not interested in solving code security issues?
Open source developers not interested in solving code security issues? Software developers invest less than 3% of their time in solving security issues in free and open source software (FOSS) and show little interest in allocating more resources moving forward, … Read More
Less than 10% of data breaches are made public
Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More
Government Source Code Leaks Compromise the Personal Data of Millions
Government Source Code Leaks Compromise the Personal Data of Millions It’s not always security researchers who uncover major data breaches or security mishaps. Reporters from a Brazilian publication have been very good lately at detecting unfortunate incidents generated by official … Read More
Top 5 human errors that lead to data breaches
Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More
When Private Photos Don’t Stay Private for Long
When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content benefits from end-to-end encryption, … Read More