Tag: EN

Pwn2Own Automotive 2024 Day 2 – Tesla hacked again

Researchers hacked the Tesla infotainment system and found 24 zero-days on day 2 of Pwn2Own Automotive 2024 hacking competition. White hat hackers from the Synacktiv Team (@Synacktiv) compromised the Tesla infotainment system on the second day of the Pwn2Own Automotive…

Top 10 Ways to Avoid Cybersecurity Misconfigurations

In the ever-evolving landscape of digital threats, cybersecurity mis-configurations have emerged as a significant vulnerability that can expose organizations to serious risks. Ensuring the security of your systems and networks requires proactive measures to prevent misconfigurations. Here are the top…

What makes ransomware victims less likely to pay up?

There’s a good reason why ransomware gangs started exfiltrating victims’ data instead of just encrypting it: those organizations pay more. University of Twente researcher Tom Meurs and his colleagues wanted to know which factors influence victims to pay the ransom…

Longer passwords aren’t safe from intensive cracking efforts

88% of organizations still use passwords as their primary method of authentication, according to Specops Software. The report found that 31.1 million breached passwords had over 16 characters, showing longer passwords aren’t safe from being cracked. 40,000 admin portal accounts…

New infosec products of the week: January 26, 2024

Here’s a look at the most interesting products from the past week, featuring releases from 1Kosmos, Atakama, Onfido, Regula, Searchlight Cyber, Seceon, and Veriti. Onfido Compliance Suite simplifies local and global identity verification Onfido’s Compliance Suite introduces Qualified Electronic Signature…

Cloud-Native Security for Modern Businesses

Modern businesses navigating the ever-evolving digital landscape have increasingly adopted cloud-native technologies as a cornerstone of their operations. However, with this heightened reliance on cloud-native… The post Cloud-Native Security for Modern Businesses appeared first on Security Zap. This article has…

Emerging trends and strategies in digital forensics

In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks on digital evidence collection. Schroader talks about the impact of exponential data growth on forensic…

Budget cuts loom for data privacy initiatives

The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s General Data Protection Law, according to ISACA. However, only 34% of organizations say they find it easy to understand their…

Essential questions for developing effective human rights policies

Growing environmental, social, and governance (ESG) expectations and expanding global regulation are propelling organizations to consider implementing a stand-alone human rights policy, according to Gartner. Public focus on human rights Shareholder proposals and media reports continue to put human rights…

E-commerce Security: Protecting Customer Data

In today’s digital landscape, ensuring the security of customer data in e-commerce is a crucial concern for businesses. With the increasing number of online transactions… The post E-commerce Security: Protecting Customer Data appeared first on Security Zap. This article has…

CI/CD Pipeline Security: Best Practices Beyond Build and Deploy

CI/CD Pipeline Security Given the demand for rapid innovation and the adoption of agile methodologies, Continuous Integration/Continuous Deployment (CI/CD) pipelines have become the foundation on which all DevOps processes are built. They are the backbone of efficient delivery.  In fact,…