Category: EN

LummaC2 Stealer’s New Anti-Sandbox Technique? Trigonometry

New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a sandbox where malware is analysed by security researches. Outpost24’s threat intelligence team, KrakenLabs, discovered that malware developers are using trigonometry to…

Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products

Johnson Controls has patched a critical vulnerability that can be exploited to take complete control of Frick industrial refrigeration products.  The post Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products appeared first on SecurityWeek. This article has been indexed…

Microsoft Hires Sam Altman and OpenAI’s New CEO Vows to Investigate His Firing

Microsoft hired Sam Altman and another architect of OpenAI for a new venture after their sudden departures shocked the artificial intelligence world. The post Microsoft Hires Sam Altman and OpenAI’s New CEO Vows to Investigate His Firing appeared first on…

Morgan Stanley Ordered to Pay $6.5 Million for Exposing Customer Information

Morgan Stanley agrees to pay $6.5 million for exposing personal information through negligent data-security practices. The post Morgan Stanley Ordered to Pay $6.5 Million for Exposing Customer Information appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Maximizing Data Security: Why Simply Factory Resetting Your Android Phone Won’t Suffice Before Selling

    In today’s tech landscape, concerns about smartphone data privacy are increasingly prevalent. While many may not possess highly sensitive information, the thought of unauthorized access to personal data remains unsettling. Despite following common safety practices online, uncertainties persist…

Fortify Your Online Business – Security Tips for Starting an e-Commerce Website

By Owais Sultan E-commerce is a lucrative business, but it requires hard work and robust cybersecurity. This is a post from HackRead.com Read the original post: Fortify Your Online Business – Security Tips for Starting an e-Commerce Website This article…

Yamaha Ransomware Attack: Employees Personal Information Exposed

A ransomware attack targeted Yamaha Motor Co., Ltd., resulting in a partial disclosure of the personal information maintained by the company. Notably, a third party gained unauthorized access to one of the servers run by Yamaha Motor Philippines, Inc. (YMPH),…

Hackers accessed sensitive health data of Welltok patients

Hackers accessed the personal data of more than a million people by exploiting a security vulnerability in a file transfer tool used by Welltok, the healthcare platform owned by Virgin Pulse. Welltok, a Denver-based patient engagement company that works with…

Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies

Russia-linked cyberespionage group APT29 has been observed leveraging the CVE-2023-38831 vulnerability in WinRAR in recent attacks. The Ukrainian National Security and Defense Council (NDSC) reported that APT29 (aka SVR group, Cozy Bear, Nobelium, Midnight Blizzard, and The Dukes) has been exploiting the CVE-2023-38831 vulnerability in…

Konni Campaign Distributed Via Malicious Document

FortiGuard Labs exposes the KONNI campaign’s distribution of using a counterfeit Russian military operation document. Read more on the details of the attack chain.        This article has been indexed from Fortinet Threat Research Blog Read the original article: Konni…

Adopting CNAPP as a Bridge Between DevOps and Cloud-Native Security

A CNAPP can infuse security into DevOps workflows while paying close attention to the unique needs of cloud-native applications. The post Adopting CNAPP as a Bridge Between DevOps and Cloud-Native Security appeared first on Security Boulevard. This article has been…

Threat Intelligence with Sandbox Analysis: Security Analyst Guide – 2024

Threat intelligence (TI) is critical to organizations’ cybersecurity infrastructure, allowing them to keep track of the evolving threat landscape and ensure timely detection. However, TI Solutions’ information frequently lacks the specifics required for thorough security measures. One way to address…

Lasso Security emerges from stealth to wrangle LLM security

LLMs are rife with security issues: jailbreaking, data poisoning, insufficient data validation. How startup Lasso Security aims to help. This article has been indexed from Security News | VentureBeat Read the original article: Lasso Security emerges from stealth to wrangle…

Inside OpenAI’s chaotic weekend: The Sam Altman dismissal to Emmett Shear’s appointment

A shocking weekend at OpenAI: CEO Sam Altman fired, president Greg Brockman resigns, Emmett Shear appointed new CEO, and spurned Altman hired by Microsoft. This article has been indexed from Security News | VentureBeat Read the original article: Inside OpenAI’s…

Intel Released Urgent Patch For Reptar Vulnerability In Its CPUs

Intel recently released a critical security fix for a newly discovered vulnerability affecting its CPUs.… Intel Released Urgent Patch For Reptar Vulnerability In Its CPUs on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This…

Google Elaborates On Campaigns Exploiting A Now-Patched Zimbra Zero-Day

Months after ensuring that the patch actually works, Google has now disclosed more details about… Google Elaborates On Campaigns Exploiting A Now-Patched Zimbra Zero-Day on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…

New “Agent Tesla” Variant: Unusual “ZPAQ” Archive Format Delivers Malware

A new variant of Agent Tesla uses the uncommon compression format ZPAQ to steal information from approximately 40 web browsers and various email clients. But what exactly is this file compression format? What advantage does it provide to threat actors?…

Cybersecurity, Legal, and Financial Experts Share Their Reactions to the SEC’s Latest Cyber Disclosure Regulations | Kovrr Blog

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cybersecurity, Legal, and Financial Experts Share Their Reactions to the SEC’s Latest Cyber Disclosure Regulations | Kovrr Blog appeared first on Security Boulevard. This article has…

Yamaha Motor Confirms Data Breach Following Ransomware Attack

Yamaha Motor discloses ransomware attack impacting the personal information of its Philippines subsidiary’s employees. The post Yamaha Motor Confirms Data Breach Following Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…

5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms

It’s crucial to thoroughly assess the risk profiles of various SSE platforms and weigh their suitability against their organization’s risk tolerance before adopting SSE. The post 5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms appeared first on SecurityWeek.…

Cyber Security Today, Nov. 20, 2023 – Forbid ransomware payments, says a Canadian hospital

This episode reports on ransomware attacks, a man sentenced in the US for his role in a hacking schem This article has been indexed from IT World Canada Read the original article: Cyber Security Today, Nov. 20, 2023 – Forbid…

OpenAI’s Altman Courted Investors For AI Chip, Device

In weeks before his shock ouster from OpenAI Altman was reportedly looking to raise billions for an AI chip start-up and an AI-focused device This article has been indexed from Silicon UK Read the original article: OpenAI’s Altman Courted Investors…

Fake Online Stores See A 135% Spike As Black Friday And Holiday Shopping Approaches

As Black Friday (and Cyber Monday) approaches, the annual online sales phenomenon shows no sign of slowing down, and neither do cybercriminals looking to take advantage of the busiest shopping days of the year. The kick-off to holiday shopping, much…

Rhysida ransomware gang: We attacked the British Library

Crims post passport scans and internal forms up for ‘auction’ to prove it The Rhysida ransomware group says it’s behind the highly disruptive October cyberattack on the British Library, leaking a snippet of stolen data in the process.… This article…

Altman, Brockman Join Microsoft After Shock OpenAI Ouster

Former OpenAI chief Sam Altman and president Greg Brockman join Microsoft to lead new AI research team after chaotic weekend negotiations This article has been indexed from Silicon UK Read the original article: Altman, Brockman Join Microsoft After Shock OpenAI…

AMIDES – Open-source Detection System to Uncover SIEM Blind Points

Cyberattacks pose a significant risk, and prevention alone isn’t enough, so timely detection is crucial. That’s why most organizations use SIEM (Security Information and Event Management) systems to centrally collect and analyze security events with expert-written rules for detecting intrusions.…

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and…

Sophos Web Appliance vulnerability exploited in the wild (CVE-2023-1671)

CISA has added three vulnerabilities to its Known Exploited Vulnerabilities catalog, among them a critical vulnerability (CVE-2023-1671) in Sophos Web Appliance that has been patched by the company in April 2023. About CVE-2023-1671 CVE-2023-1671 is a pre-auth command injection vulnerability…

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts. The method is designed to “delay detonation of the sample…

Why Defenders Should Embrace a Hacker Mindset

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal…

Understanding the UK government’s new cybersecurity regime, GovAssure

With the ever-growing threat of cyberattacks on the UK government and Critical National Infrastructure cyber safety matters more than ever. With the rising tide of ever-resent threat in mind, GovAssure was launched by the UK government in April 2023. It’s…

Resecurity partners with University of Jeddah to improve cybersecurity education

Resecurity announced a strategic partnership with University of Jeddah, one of the leaders in higher education in the Kingdom of Saudi Arabia, to further strengthen the country’s cybersecurity talent pipeline and facilitate capacity building programs for academia. This landmark partnership…

Navigating the Waters of AI: Safeguarding Against Data Security Risks

In the era of rapid technological advancement, artificial intelligence (AI) has emerged as a powerful tool with transformative potential across various industries. While AI brings unprecedented opportunities, it also introduces new challenges, particularly in the realm of data security. As…

Ransomware group wants to partner up with government, files SEC complaint against its victim

Cyber gangs cross a new milestone Cyber gangs just crossed a milestone – they have started filing complaints with the US Securities and Exchange Commission… The post Ransomware group wants to partner up with government, files SEC complaint against its…

K-12 Schools Improve Protection Against Online Attacks, but Many Are Vulnerable to Ransomware Gangs

Some K-12 public schools are racing to improve protection against the threat of online attacks, but lax cybersecurity means thousands of others are vulnerable to ransomware gangs that can steal confidential data and disrupt operations. The post K-12 Schools Improve…

US Announces $70 Million Cybersecurity Boost for Rural, Municipal Utilities

The US Department of Energy is offering $70 million in funding to improve the cybersecurity of rural and municipal utilities. The post US Announces $70 Million Cybersecurity Boost for Rural, Municipal Utilities appeared first on SecurityWeek. This article has been…

250 Organizations Take Part in Electrical Grid Security Exercise

Over 250 organizations take part in GridEx VII, the largest North American exercise focusing on the security of the electrical grid. The post 250 Organizations Take Part in Electrical Grid Security Exercise appeared first on SecurityWeek. This article has been…

How are Crypto Phishing Scams Done, and How Do You Avoid Them?

Crypto phishing scams are fraudulent activities designed to steal your cryptocurrency assets, typically by tricking you into revealing your private keys or sending your cryptocurrencies to the scammer’s wallet. These scams often involve deception, social engineering, and manipulation. Here’s how…

Now a Stock Market business hires hackers

Six Group, a technology firm responsible for securing the operations of Spanish and Swiss Bourses, is actively recruiting hackers to counter sophisticated attempts to breach its network. The motivation behind hiring these cybersecurity experts is to gain insights into the…

Shear Takes Over As OpenAI Interim Chief, Promises Independent Probe

Twitch co-founder Emmett Shear takes over as OpenAI interim chief executive after failed talks to bring back ousted Sam Altman This article has been indexed from Silicon UK Read the original article: Shear Takes Over As OpenAI Interim Chief, Promises…

Change Variance: How Tiny Differences Can Impact Your IT World

In the vast and ever-evolving universe of information technology, there’s one constant: change (that and cliches about constants!). Servers, systems, and software – they all get updated and modified. But, have you ever stopped to consider how even tiny differences…

Phishing Trends Examined by the SANS Institute

Earlier this year, the SANS Institute published a blog exploring emerging phishing trends. This kind of research is an invaluable resource for all individuals and organizations looking to identify and rebuff phishing attacks. In this article, we’ll cover some of…

The dark side of Black Friday: decoding cyberthreats around the year’s biggest shopping season

As Black Friday approaches, Kaspersky analyzes phishing and spam activity around major sales events, and reviews statistics on online shopping threats in 2023. This article has been indexed from Securelist Read the original article: The dark side of Black Friday:…

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms. “Randstorm() is a term we…

CVE-2023-46604 (Apache ActiveMQ) Exploited to Infect Systems With Cryptominers and Rootkits

We uncovered the active exploitation of the Apache ActiveMQ vulnerability CVE-2023-46604 to download and infect Linux systems with the Kinsing malware (also known as h2miner) and cryptocurrency miner. This article has been indexed from Trend Micro Research, News and Perspectives…

Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and unauthorized access. Affected are platforms that are essential for hosting and deploying large language models, including Ray,…

US teenager pleads guilty to his role in credential stuffing attack on a betting site

US teenager Joseph Garrison pleads guilty to carrying out a credential stuffing attack on a betting website. US teenager Joseph Garrison (19) has pleaded guilty to his involvement in a credential stuffing campaign that targeted user accounts at a fantasy…

DarkCasino joins the list of APT groups exploiting WinRAR zero-day

The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831. Researchers at cybersecurity firm NSFOCUS analyzed DarkCasino attack pattern exploiting the WinRAR zero-day vulnerability tracked as CVE-2023-38831. The economically motivated APT group used specially crafted archives…

‘123456’ Crackable in seconds, 2023’s Most Prevalent Password

For half a decade, NordPass has delved into the realm of password habits, uncovering familiar tunes that persist.  However, this year’s narrative is layered with intriguing patterns, particularly within distinct platform categories.  Amidst the discourse on passkeys, a question lingers:…

A Detection and Response Benchmark Designed for the Cloud

Does your security operation center’s performance meet the 5/5/5 benchmark for cloud threat detection and incident response? This article has been indexed from Dark Reading Read the original article: A Detection and Response Benchmark Designed for the Cloud

Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats

Combining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities. This article has been indexed from Dark Reading Read the original article: Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats

OracleIV DDoS Botnet Alert: Secure Your Docker Engine APIs

Attention Docker users: a new threat known as OracleIV is on the rise, targeting publicly accessible Docker Engine API instances. Researchers from Cado have uncovered a campaign where attackers exploit misconfigurations to turn machines into a distributed denial-of-service (DDoS) botnet.…

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade. The Appin Software Security (aka Appin Security Group), according to an in-depth analysis from…

9 Black Friday cybersecurity deals you don’t want to miss

PortDroid PortDroid is a trusted app for all network analysis tasks. Designed with network administrators, penetration testers, and technology enthusiasts in mind, this app brings a collection of essential networking tools right at your fingertips. Deal: 50% off Promo code:…

How effective compensation makes a difference with cyber talent retention

Aligning cybersecurity organization models with business objectives enables talent retention and security program success, according to IANS and Artico Search. CISOs’ role in organizational and staffing decisions Fortune firms with annual revenues exceeding $6 billion generally operate large and specialized…

MFA under fire, attackers undermine trust in security measures

In this Help Net Security video, Renée Burton, Head of Threat Intelligence at Infoblox, discusses MFA attacks. MFA adds security to online accounts, but MFA lookalikes are a real threat to consumers and enterprises. Consumers have come to trust MFA,…

Smaller businesses embrace GenAI, overlook security measures

Organizations are feeling the pressure to rush into generative AI (GenAI) tool usage, despite significant security concerns, according to Zscaler. More than 900 global IT decision makers, although 89% of organizations consider GenAI tools like ChatGPT to be a potential…

Outsmarting cybercriminals is becoming a hard thing to do

Cybercriminals have evolved into organized and highly adaptive networks, collaborating globally to exploit weaknesses in cybersecurity defenses. Their motivations range from financial gain and information theft to political espionage and ideological warfare. Cybercriminals, now more than ever, are exploiting vulnerabilities…

Only 9% of IT budgets are dedicated to security

Despite their best efforts, 67% of businesses say they need to improve security and compliance measures with 24% rating their organization’s security and compliance strategy as reactive, according to Vanta. The expansion of attack surfaces in a post-pandemic hybrid world,…

CrowdStrike Extends AI Approach to Cybersecurity to SMBs

CrowdStrike Falcon Go enables small-to-medium businesses (SMBs) to leverage machine learning algorithms to secure their IT environments. The post CrowdStrike Extends AI Approach to Cybersecurity to SMBs appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?

By James Langley, Master Solutions Consultant, Hitachi Vantara Federal June 2023 marked the four-year anniversary of the release of the final Cloud Smart strategy, which was the government’s update to […] The post Four Years and a Pandemic Later: Have…

Embracing Zero Trust Architecture: A Critical Best Practice for Cybersecurity in Enterprises

By Walt Szablowski, Founder and Executive Chairman, Eracent Summary: With the increasing frequency and sophistication of cyberattacks in the digital landscape, and the failure of legacy cybersecurity tools and methods, […] The post Embracing Zero Trust Architecture: A Critical Best…

Crypto Scammers Exploit Gaza Crisis, Deceiving Users in Donation Scam

By Deeba Ahmed Scammers taking advantage of a humanitarian crisis? Well, who saw that coming… This is a post from HackRead.com Read the original post: Crypto Scammers Exploit Gaza Crisis, Deceiving Users in Donation Scam This article has been indexed…

SSE vs. Traditional Security Models – The Variances

In today’s hyper-connected digital world, cybersecurity stands as a paramount concern, with organizations seeking robust solutions to protect… The post SSE vs. Traditional Security Models – The Variances appeared first on Hackers Online Club (HOC). This article has been indexed…

AI/ML Tools Uncovered with 12+ Vulnerabilities Open to Exploitation

  Since August 2023, individuals on the Huntr bug bounty platform dedicated to artificial intelligence (AI) and machine learning (ML) have exposed more than a dozen vulnerabilities that jeopardize AI/ML models, leading to potential system takeovers and theft of sensitive…

Toyota Acknowledges Security Breach After Medusa Ransomware Threatens to Leak Data

  Toyota Financial Services (TFS) announced that unauthorised access was detected on some of its systems in Europe and Africa after the Medusa ransomware claimed responsibility for the attack.  Toyota Financial Services, a subsidiary of Toyota Motor Corporation, is a…

Android’s Privacy Boost: Google Unveils ‘Private Spaces’ Feature to Safeguard Photos and Data

  There is no doubt that it is not a whole new thing to want to keep certain apps, data, and images on users’ phones private, but there still has not been a complete solution to keeping everything secure.  The…

Security Affairs newsletter Round 446 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Israeli…

Bengaluru Police Bust Rs 854 Crore Cyber Fraud

The Bengaluru Police have made significant progress in uncovering a sophisticated cyber investment fraud that involved an astonishing amount of Rs 854 crore. The study clarifies the complex network of mule accounts that was essential to carrying out this financial…

8Base ransomware operators use a new variant of the Phobos ransomware

8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks. Cisco Talos researchers observed 8Base ransomware operators using a variant of the Phobos ransomware in recent attacks. Phobos variants are usually distributed by the SmokeLoader,…

Week in review: Juniper devices compromised, great corporate security blogs, MITRE D3FEND

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The real cost of healthcare cybersecurity breaches In this Help Net Security interview, Taylor Lehmann, Director, Office of the CISO, Google Cloud, discusses the critical…

Network Segmentation Guide: Essential Security Best Practices Revealed

Unlocking the Power of Network Segmentation: A Comprehensive Guide for Enhanced Security In the dynamic world of cybersecurity, network segmentation emerges as a pivotal strategy for safeguarding digital assets. This practice involves dividing a computer network into smaller, distinct segments…

Microsoft’s Purview: A Leap Forward in AI Data Security

Microsoft has once again made significant progress in the rapidly changing fields of artificial intelligence and data security with the most recent updates to Purview, its AI-powered data management platform. The ground-breaking innovations and improvements included in the most recent…

Dark Effects of Bot Attacks that Drive 73% of Internet Traffic

In a chilling revelation, the cybercrime economy is projected to soar to $10.5 trillion by 2025, driven by financially motivated bad actors orchestrating dark enterprises.  Uncover the intricate web of these malicious activities and the alarming surge in cyber threats.…

AI Demystified: Unraveling Artificial Intelligence (AI)

As the world continues to progress, so does its technology. Artificial Intelligence (AI) has become a major milestone in this advancement, bringing with it countless… The post AI Demystified: Unraveling Artificial Intelligence (AI) appeared first on Security Zap. This article…

Multimillion-Dollar Vishing Scam Busted: Czech-Ukrainian Gang Arrested

By Deeba Ahmed Czech Republic Police Expose ‘Fake Bankers’ Gang in $8.7 Million Vishing Operation. This is a post from HackRead.com Read the original post: Multimillion-Dollar Vishing Scam Busted: Czech-Ukrainian Gang Arrested This article has been indexed from Hackread –…

Five Cybersecurity Predictions for 2024

“Over the past year, we’ve witnessed significant developments in cybersecurity, including the emergence of generative AI and its ability to enhance organizations’ threat intelligence efforts, and the rise of Threat Exposure Management, a program of consolidation to identify and mitigate…

Microsoft Windows To Release Copilot For AI And Security

Microsoft’s AI technology is now accessible on an additional 1 billion devices.. What is Copilot in Windows? New… The post Microsoft Windows To Release Copilot For AI And Security appeared first on Hackers Online Club (HOC). This article has been…

Israeli man sentenced to 80 months in prison for providing hacker-for-hire services

An Israeli hacker has been sentenced to 80 months in prison in the US for his role in a massive spear-phishing campaign. Aviram Azari (52) was sentenced to 80 months in prison for computer intrusion, wire fraud, and aggravated identity…

Content collaboration is key — so is protecting your enterprise from its threats

Every enterprise is using content collaboration tools. But they do pose threats. How to keep information flowing both freely and safely. This article has been indexed from Security News | VentureBeat Read the original article: Content collaboration is key —…

Addressing Legacy System Patching Neglect

By Joao Correia The persistent neglect of patching legacy systems has long affected critical infrastructure as well as nearly all major industries. At a time when the cyberthreat environment is teeming with new malware variants, cybercriminal groups and data-hungry hackers,…

To Navigate Cyberattacks Effectively, Start with Empathy

By Ric Opal, Principal and National Leader of IT Solutions and Strategic Partnerships at BDO Digital From username, password, and credit card hacking to other forms of authentication attacks, Microsoft blocked, on average, 4,000 identity authentication threats every second in…

E-commerce Security in the Cloud: Safeguarding Data in the Holiday Season

By Dan Benjamin, CEO and Co-Founder, Dig Security The holiday sales season is the most important time of year for e-commerce retailers, representing a time of heightened consumer activity and potential revenue growth. Retailers are forced to maintain security while balancing the consumer…