Uber investigating security breach of several internal systems

Image: Adobe Stock Must-read security coverage Ride-sharing company Uber suffered a security breach Thursday, Aug. 15, that forced the company to shut down several internal communications and engineering systems. The…

Continue ReadingUber investigating security breach of several internal systems

Sliver offensive security framework increasingly used by threat actors

The offensive security tool used by penetration testers is also being used by threat actors from the ransomware and cyberespionage spheres. Image: Adobe Stock The business of penetration testing and…

Continue ReadingSliver offensive security framework increasingly used by threat actors

How to strengthen the human element of cybersecurity

Image: Unsplash The best defense against cyberattacks is not technological cybersecurity solutions but the strengthening of the human element, Perry Carpenter—cybersecurity veteran, author and chief evangelist-security officer for KnowBe4, said.…

Continue ReadingHow to strengthen the human element of cybersecurity

Seaborgium targets sensitive industries in several countries

Image: Adobe Stock New research from Microsoft Threat Intelligence Center (MSTIC) sheds light on a cyberespionage threat actor known as Seaborgium. Who is Seaborgium? Must-read security coverage Seaborgium is a…

Continue ReadingSeaborgium targets sensitive industries in several countries