Tag: EN

Disk Union – 690,667 breached accounts

In June 2022, the Japanese record chain store Disk Union suffered a data breach. The incident exposed 690k unique email addresses along with names, post codes, phone numbers and plain text passwords. This article has been indexed from Have I…

5 SaaS Blind Spots that Undermine HIPAA Security Safeguards

Hidden SaaS risks can quietly undermine HIPAA security safeguards. Discover how SaaS visibility and control help protect ePHI and ensure HIPAA compliance. The post 5 SaaS Blind Spots that Undermine HIPAA Security Safeguards appeared first on Security Boulevard. This article…

How Biometric Data Collection Affects Workers

  Modern workplaces are beginning to track more than just employee hours or tasks. Today, many employers are collecting very personal information about workers’ bodies and behaviors. This includes data like fingerprints, eye scans, heart rates, sleeping patterns, and even…

Attackers exploit Fortinet flaws to deploy Qilin ransomware

Qilin ransomware now exploits Fortinet vulnerabilities to achieve remote code execution on impacted devices. Threat intelligence firm PRODAFT warned that Qilin ransomware (aka Phantom Mantis) group targeted multiple organizations between May and June 2025 by exploiting multiple FortiGate vulnerabilities, including…

Victory! Austin Organizers Cancel City’s Flock ALPR Contract

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Austin organizers turned out to rebuke the city’s misguided contract with Flock Safety— and won. This successful pushback from the community means at the end of the…

LLM04: Data & Model Poisoning – FireTail Blog

Jun 06, 2025 – Lina Romero – LLM04: Data & Model Poisoning Excerpt: In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is…

Unleashing Powerful Cloud-Native Security Techniques

Is Managing Non-Human Identities the Key to Achieving Robust Cloud-Native Security? Where humans and machines square off, intent on breaching each other’s defenses. However, an important facet often goes unnoticed – Non-Human Identities (NHIs). NHIs are machine identities, especially in…

Why Securing NHIs Reduces Your Cyber Risk

Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk management and cyber protection.…