The Third-Party Okta Hack Leaves Customers Scrambling

Credit to Author: Lily Hay Newman| Date: Wed, 23 Mar 2022 00:13:04 +0000
Authentication firm Okta’s statements on the Lapsus$ breach fails to answer key questions.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Wed, 23 Mar 2022 00:13:04 +0000
Authentication firm Okta’s statements on the Lapsus$ breach fails to answer key questions.
Read More
Credit to Author: Lily Hay Newman| Date: Tue, 22 Mar 2022 15:27:50 +0000
Lapsus$ leaking Microsoft source code would be bad enough. Breaching Okta could be much, much worse.
Read More
Credit to Author: Jonny Evans| Date: Tue, 22 Mar 2022 08:04:00 -0700
Each time we experience an Apple iCloud, Spotify, Slack, Verizon, Google, Peloton, or any other form of server-based outage, we’re reminded that everyone should have multiple layers of backup to maintain data and work to ensure key services still work when servers go down.

Credit to Author: Steven J. Vaughan-Nichols| Date: Tue, 22 Mar 2022 03:00:00 -0700
One of the dirty little secrets of many businesses, perhaps even most, is that far more of them than ever admit to it have been hacked. Still others end up paying ransomware, but they’ve never revealed this deep, dark secret. After all, who wants to admit to the world — and their customers — that they’ve been caught with their security pants down.
Well, things are about to change. In the recently signed $1.5 trillion government funding bill were new cybersecurity laws requiring companies to quickly report data breaches and ransomware payments.

Credit to Author: Rachel Lance| Date: Sun, 20 Mar 2022 13:30:08 +0000
A brief history and the ramifications of cluster bombs, history’s most indiscriminate weapon.
Read More
Credit to Author: David Nield| Date: Sun, 20 Mar 2022 12:00:00 +0000
Lock down your account to tweet in peace or take the guardrails off to court controversy.
Read More
Credit to Author: Andrew Couts| Date: Sat, 19 Mar 2022 13:00:00 +0000
Plus: Anonymous dedicates a hack to Hillary Clinton, Google researchers expose Exotic Lily, and more.
Read More
Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 19 Mar 2022 12:00:00 +0000
The author of a popular application pushed out an update containing malicious code in an effort to sabotage computers in the country.
Read More