Ukraine war scams: Cybercriminals stole my identity
Scammers are using emotionally charged tricks in a bid to steal online donations......»»
New DNA analysis helps bust 200-year-old royal conspiracy theory
A new genetic analysis by an international team of scientists has helped bust a popular 200-year-old myth surrounding Kaspar Hauser, whose identity became one of the most mysterious riddles in German history. The study is published in iScience as a p.....»»
Q&A: How do presidential candidates embody ideas about race and national identity, including views of Latinos?
J. David Cisneros, a professor of communication and an affiliate of Latina/Latino Studies at the University of Illinois Urbana-Champaign researches social movements and public rhetoric about race, culture and citizenship......»»
Clutch Security launches to transform management of NHIs
Clutch Security emerged from stealth and unveiled its Universal Non-Human Identity (NHI) Security Platform. The company also announced a $8.5 million funding round led by Lightspeed Venture Partners, with participation from Merlin Ventures, and notab.....»»
Zelenskiy signs law allowing Ukraine debt payment suspension
Zelenskiy signs law allowing Ukraine debt payment suspension.....»»
Adaptive Shield unveils ITDR platform for SaaS
Adaptive Shield has unveiled its Identity Threat Detection & Response (ITDR) platform for SaaS environments. The recent Snowflake breach served as a wake-up call for the SaaS industry. On May 27, a threat group announced the sale of 560 million stole.....»»
Employee charged with stealing more than $50,000 from New York CDJR dealership
A Victory Chrysler-Dodge-Jeep-Ram employee in Rome, NY., allegedly stole more than $50,000 from the dealership and was charged with second-degree grand larceny and first-degree falsifying business records......»»
New infosec products of the week: July 26, 2024
Here’s a look at the most interesting products from the past week, featuring releases from GitGuardian, LOKKER, Permit.io, Secure Code Warrior, and Strata Identity. GitGuardian’s tool helps companies discover developer leaks on GitHub GitGuardian.....»»
AI-generated deepfake attacks force companies to reassess cybersecurity
As AI-generated deepfake attacks and identity fraud become more prevalent, companies are developing response plans to address these threats, according to GetApp. In fact, 73% of US respondents report that their organization has developed a deepfake r.....»»
Research highlights impact of Ukrainian President Zelensky"s traits on global perceptions
A new study reveals that Ukrainian President Volodymyr Zelensky's communal personality traits significantly increase empathy and pro-social behaviors towards Ukrainian citizens amid the ongoing Russia-Ukraine war. The study was conducted by Prof. Mei.....»»
How CISOs enable ITDR approach through the principle of least privilege
Somewhere, right now, a CISO is in a boardroom making their best case for stronger identity threat detection and response (ITDR) initiatives to lower the risk of intrusion. For a good reason, too: Look no further than the Change Healthcare breach, wh.....»»
Russia"s war in Ukraine has been devastating for animals—but they"ve also given the nation reason for hope
Russia's war in Ukraine has caused immense suffering to the civilian population. Tens of thousands are believed to have been killed, though an exact figure is impossible to know. Russia's aggression has also sparked the biggest refugee crisis in Euro.....»»
Strata Identity Continuity prevents mission-critical applications from going offline
Strata Identity announced Identity Continuity, an addition to its Maverics Identity Orchestration platform. This new premium offering ensures business continuity and uninterrupted application access by seamlessly failing over from a primary cloud Ide.....»»
The changes in the cyber threat landscape in the last 12 months
When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat Assessment (.....»»
Fighting AI-powered synthetic ID fraud with AI
Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud cases. For security professionals, the challenge lies in staying one step ahead.....»»
Elon Musk says SpaceX and X will relocate their headquarters to Texas
The billionaire blamed a California gender identity law for moving SpaceX and X headquarters. Enlarge / A pedestrian walks past a flown Falcon 9 booster at SpaceX headquarters in Hawthorne, California, on Tuesday, the same day El.....»»
Rezonate boosts security for both human and non-human identities
Rezonate unveiled unified coverage from human to non-human identity security (NHI) with comprehensive capabilities: identity inventory and visibility, security posture, compliance, and identity threat detection and response (ITDR). The platform is ta.....»»
Week in review: RADIUS protocol critical vuln, Microsoft 0-day exploited for a year, AT&T breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Hackers stole call, text records of “nearly all” of AT&T’s cellular customers Hackers leveraging stolen Snowflake account credentials have sto.....»»
Gathid identity governance platform enhancements help identify access changes
Gathid announced the release of Version 1.14.0 of its identity governance platform. This latest update introduces new comprehensive export capabilities that enable users to seamlessly establish an identity baseline in minutes with a complete view of.....»»
Hackers stole call, text records of “nearly all” of AT&T’s cellular customers
Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to October 2022, the company has confirmed. “The data does not contain the c.....»»
Travel scams exposed: How to recognize and avoid them
In this Help Net Security video, Aaron Walton, Threat Intel Analyst at Expel, discusses travel scams. For the past 18 months, the Expel SOC team has observed a campaign targeting administrative credentials for Booking.com. The attackers create phishi.....»»