Home Blog Page 354
Cybersecurity startup Exabeam recently raised $50 million in a series D round of funding led by Lightspeed Venture Partners. The other investors in the round included Cisco Investments, Norwest Venture Partners, Aspect Ventures, Icon Ventures, and Shlomo Kramer. The...
BusinessWire: Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey by Gartner, Inc. While cloud computing presents organizations with novel opportunities, a number of new risks —...
The Department of Defense recently ran a bug bounty program dubbed ‘Hack the Marine Corps’, a challenge focused on the Corps’ public-facing websites and services. The event was jointly created by the Department of Defense and HackerOne, vulnerability disclosure...
A security team from Tencent Blade exposed new security vulnerabilities around smart speakers. Researchers Wu HuiYu and Qian Wenxiang gave a live demonstration at the DEFCON security conference on how to hack a smart speaker. The team used Amazon...
A new research from cybersecurity solutions provider Check Point revealed how organizations and individuals are vulnerable to hacking through their fax machines. Researchers at Check Point stated that fax machines have security vulnerabilities which could possibly allow a hacker to...
Election hacking is now a child’s play, or at least that is what Democratic National Committee (DNC) of United States is trying to show at the DEFCON in Las Vegas. Inspired by last year’s DEFCON’s Voting Village, where attendees got...
Contributed by Cloud Security Alliance By Jon-Michael C. Brook, Principal, Guide Holdings, LLC Security departments have their hands full. The first half of my career was government-centric, and we always seemed to be the “no” team, eliminating most initiatives before they started. The...
Hackers may have accessed nearly 34,000 guest records from the server of Britain's holiday camp firm Butlin’s.  The leaked data includes names, home addresses, email addresses, phone numbers as well as the trip itinerary. The firm assured that payment details...
Researchers stated that the websites of the candidates running for the House of Representatives elections in November are vulnerable to hacking. A team of four researchers led by former National Institutes for Standards and Technology security expert Joshua Franklin highlighted...
PGA of America, which runs the PGA Championship golf tournament, has become the latest victim of a ransomware attack after hacker group Shadowy bandits hijacked its computer servers locking the staff out of crucial files containing marketing materials for...