The third party had received customer data from Nissan to use in developing and testing software solutions for the automaker,...
Information Security
Despite stealing Okta's source code, attackers did not gain unauthorized access to the Okta service or customer data, says the company. Okta's "HIPAA,...
In 1996, the U.S. Federal Bureau of Investigation (FBI) launched a program named InfraGard to develop physical and cyber threat...
As CISO at (ISC)2 Jon France explains: “We predict the recession will cause a reduction in spending on training programs. Despite the...
Cloud9 is a malicious browser extension that backdoors Chromium browsers to perform an extensive list of malicious functions and capabilities....
The successful breach resulted from a phishing attack that targeted multiple Dropbox employees using emails impersonating the CircleCI continuous integration and...
A global study of 1,100 cybersecurity professionals by Mimecast found that one-third are considering leaving their role in the next...
While phishing campaigns are nothing new, this "as-a-service" approach is a bit concerning, as it makes it easier for people...
"The potency of the Chaos malware stems from a few factors," Black Lotus Labs researchers wrote in a Wednesday morning blog...
The phrase "zero trust" has become a sometimes meaningless buzzword in the security industry, but the Uber breach seems to...