Eskenzi PR ad banner Eskenzi PR ad banner

Uncategorized

Gloved fingers type on keyboard

As reported last week, over 69 million users of the site Neopets, a popular virtual pet website, may have had their data compromised in the first known US mega breach of the year. The company took to Twitter to confirm the news. Neopets is owned by Viacom. The Tweet said: “Neopets recently became aware that customer data may have been stolen. We immediately launched an investigation assisted by a leading forensics firm. We are also...

Read more
Hacker Claims to Have Stolen Information on 1 Billion Chinese Citizens

China has fined Didi Global, a global mobility technology, around $1.2 billion (8.026 billion yuan) for violating the country's network security law, personal information protection law, and data security law. The country's cybersecurity regulator, the Cyberspace Administration of China (CAC), also fined two Didi executives 1 million yuan each for the infringements. The ride-hailing service had its app removed from the web by the Chinese authorities last year, prompting an investigation to start. The CAC...

Read more
FBI Director Announces an Expected Onslaught of Digital Assaults Targeting Midterm Elections

The FBI is preparing for a wave of multilayered digital assaults and disinformation campaigns targeting the 2022 US midterm election process. The perpetrators of these attacks are likely to be the state governments of China, Russia and Iran with the goal of sewing confusion and mistrust in the process. Systematic influence operations "cause panic or lack of confidence in our election infrastructure,” FBI director Christopher Wray said during a cybersecurity conference at Fordham University in...

Read more
Cyber Insurance Companies Are Looking for New Ways to Assess Risk, Report Finds

A report released by Panaseer, a cybersecurity company, last week suggests that cyber insurance companies are looking for new ways to assess risk as they grow increasingly wary of rising claims. The 2022 Cyber Insurance Market Trends Report found that there is a lack of confidence in underwriting processes. Nearly one in 10 respondents admitted that they were 'not that confident' in their underwriting capabilities for cyber insurance. Only 44% of insurers said that they...

Read more
Hands on laptop keyboard

HackerOne, a vulnerability coordination and bug bounty platform, announced that a former employee of theirs had used their access to sensitive information regarding the vulnerabilities of clients to turn a quick profit. The unnamed individual’s system access was terminated just 24 hours after a tip off from a customer revealed they had “improperly accessed information in clear violation of our values, our culture, our policies, and our employment contracts.” The employee appeared to have contacted...

Read more
Phone with white background

Whether you are ordering food online, booking a doctor's appointment, or checking your balance, you are doing it through your phone. For many years we believed that we had a valid reason to trust our phone with sensitive information. Today, we have to acknowledge that this isn't completely true and examine the risks inherent in our mobile devices. Looking ahead to 2022, these are the threats to be on the lookout for. DATA LEAKS Accepting...

Read more
Professionals at computers

The ransomware-as-a-service (RaaS) Black Basta has struck 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within two months of its emergence in the cybersecurity landscape. The speed at which it has accumulated victims in such a short time frame has made it a prominent new threat for the cybersecurity of governments and a range of different industries. "Black Basta has been observed targeting a range of industries, including manufacturing, construction, transportation,...

Read more
Women sitting at chair in front of computer

Cato Networks, a Tel-Aviv based network security company, announced on Tuesday that it was going to be adding network-based capabilities to their Cato SASE cloud product. The Cato SASE Cloud (secure access service edge) was born out of the explosion of remote users and Software as a Service (SaaS) applications. From this came a need for better network-based security.  SASE combines wide-area networking (WAN) with network security services and, in a world first, Cato turned...

Read more
Headshot of Eric Milam

Searchlight Security appointed Eric Milam as their new Executive Vice President of Product. Milam is a renowned cybersecurity expert who brings deep expertise in threat intelligence and research, a decisive leadership style, and a creative approach to cyber-security problem-solving and solution design. Milam has worked previously as a VP of Research & Intelligence at Blackberry and, before that, as VP of Research Operations at Cylance. Searchlight Security, a mission-proven dark web intelligence company, is bringing...

Read more
A white Apple logo above a dimly lit Apple Store.

Apple has announced that, in 2021, it prevented over 1.6 million risky and untrustworthy apps and app updates from reaching the App Store and stopped over $1.5 billion in fraudulent transactions. Apple produced its first fraud prevention analysis last year with information about 2020. Last year's report showed that Apple had prevented one million potentially bad apps from the App Store and protected customers from nearly $1.5 billion in potentially fraudulent transactions. In 2021, Apple...

Read more
Page 5 of 17 1 4 5 6 17