Tag: EN

How mobile firewalls protect against enterprise threats

<p>Firewalls are an important tool for data protection on traditional desktops and mobile endpoints alike.</p> <p>A <a href=”https://www.techtarget.com/searchsecurity/definition/firewall”>firewall</a> is firmware or software that can manage the inbound and outbound traffic of a network or device. It provides end-user devices with…

Women’s Dating App Tea Exposes Selfie Images of 13,000 Users

The women-only dating safety app Tea has suffered a significant cybersecurity incident, with hackers gaining unauthorized access to approximately 72,000 user images, including 13,000 sensitive selfies and identification documents used for account verification.  The breach, which represents one of the…

Threat Actors Allegedly Claiming Breach of Airpay Payment Gateway

Cybercriminals have allegedly compromised Airpay, one of India’s prominent digital payment gateway providers, exposing sensitive financial data of thousands of users and businesses.  The threat actors are currently advertising the company’s complete database on dark web marketplaces, raising serious concerns…

World Leaks Outfit Linked to Dell Test Lab Intrusion

  Dell Technologies has acknowledged a serious security compromise affecting its Customer Solution Centers platform, the latest high-profile intrusion by the World Leaks extortion outfit.  The breach occurred earlier this month and targeted Dell’s isolated demonstration environment, which is designed…

Third-Party Breach Impacts Majority of Allianz Life US Customers

Insurance firm Allianz Life said that a threat actor accessed personally identifiable information of the majority of its 1.4 million US customers This article has been indexed from www.infosecurity-magazine.com Read the original article: Third-Party Breach Impacts Majority of Allianz Life…

DLP and DSPM: Navigate policy challenges and quiet alert noise

<p>At a data security seminar in July, I had the opportunity to sit down with practitioners and talk about data loss prevention challenges and how <a href=”https://www.techtarget.com/searchsecurity/definition/data-security-posture-management-DSPM”>data security posture management</a> connected to their <a href=”https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP”>DLP</a> strategies. The challenges these defenders…

Root Evidence Launches With $12.5 Million in Seed Funding

Root Evidence is developing fully integrated vulnerability scanning and attack surface management technology. The post Root Evidence Launches With $12.5 Million in Seed Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Root…