What Really Motivated the Breaches of Twitch and Epik?
The Washington Post explores recent breaches at Twitch and Epik — and asks whether they really signal an upsurge in "hacktivism": The perpetrators of these hacks are distancing themselves from financially driven cybercriminals and ransomware g.....»»
3 main tactics attackers use to bypass MFA
Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on.....»»
Twitch quickly reverses policy that “went too far” allowing nudity
Twitch confirmed its policy banning nudity was sexist. Enlarge (credit: SOPA Images / Contributor | LightRocket) Just two days after updating its policy to allow for more nudity, Twitch has announced that it's immediate.....»»
Twitch allowing more nudity after disproportionately banning female streamers
Twitch confirmed its policy banning nudity was sexist. Enlarge (credit: SOPA Images / Contributor | LightRocket) Twitch users have finally pushed the interactive livestreaming service to allow more nudity after years of.....»»
Intel just called out Nvidia
The entire industry is motivated to eliminate the CUDA market, said Intel CEO Pat Gelsinger......»»
Organizations prefer a combination of AI and human analysts to monitor their digital supply chain
The number of cyber breaches targeting organizations’ supply chains continues to rise, with an average 4.16 breaches reported to be negatively impacting operations this year — a 26% increase from the mean number of 3.29 breaches in 2022, acco.....»»
Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns
Attackers are compromising high-privilege Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks. Abusing OAuth applications OAuth is an open standard authentication protocol that uses tokens to grant a.....»»
Military geographic data is being stolen in data breaches, China warns
China has blamed 'foreign software' for a number of data breaches including sophisticated geographical information on its military and transport infrastructure.....»»
Twitch exit from S. Korea is latest fallout from “sending-party-pays” model
Twitch: Network fees in Korea 10 times more expensive than in most countries. Enlarge (credit: Getty Images | NurPhoto) Amazon-owned Twitch plans to stop providing its streaming platform in South Korea, saying that fees.....»»
PSA: It’s a good time to turn on ADP; Apple study reveals 2.6B personal records stolen in data breaches
Following up on last year’s report “The Rising Threat to Consumer Data in the Cloud”, Apple has shared a new study from MIT’s Dr. Madnick that looks at how cyber threats are growing worldwide. Read on for a look at the state of online securit.....»»
Apple issues grave warning on user privacy to promote its own data protection
A year after claiming user privacy breaches were at an historic high, Apple's new report says they're now risen 20% more in the US alone.Apple introduced Advanced Data Protection in 2022In December 2022, Apple unveiled new security safeguards for use.....»»
Third-party breaches shake the foundations of the energy sector
90% of the world’s largest energy companies experienced a third-party breach in the past 12 months, according to SecurityScorecard. Powering the global economy and everyday activities, the energy sector’s significance makes it a key focus for.....»»
Searchlight Cyber launches Exposure Data view in DarkIQ
Searchlight Cyber has launched a new Exposure Data view in DarkIQ, collating 450+ billion dark web data points from data breaches and malware infection to help organizations spot threats related to their business long before they trigger detection sy.....»»
Young humpback whale leaps out of Seattle bay, dazzling onlookers
A humpback whale visiting the waters off Seattle dazzled onlookers Thursday morning with several breaches in the bay just beyond the city's downtown area......»»
2 municipal water facilities report falling to hackers in separate breaches
The facilities, in Pennsylvania and Texas, serve more than 2 million residents. Enlarge (credit: Getty Images) In the stretch of a few days, two municipal water facilities that serve more than 2 million residents in part.....»»
New horizons in cyber protection with 2024 trends to watch
2023 proved to be another challenging year for companies combating supply chain security and breaches. The 2024 outlook could be worse as attacks become increasingly sophisticated. In this Help Net Security video, Fei Huang, VP of Security Strategy a.....»»
OpenAI to name ex-Twitch chief Emmett Shear as new boss
The tech firm will reportedly appoint Emmett Shear while ousted chief Sam Altman is joining Microsoft......»»
Week in review: Juniper devices compromised, great corporate security blogs, MITRE D3FEND
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The real cost of healthcare cybersecurity breaches In this Help Net Security interview, Taylor Lehmann, Director, Office of the CISO, Google Cloud,.....»»
Traditional cloud security isn’t up to the task
In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe risk to their business operations, according to Illumio. The average organization who suffered.....»»
Boys choir found to compete sexually for female audiences through more energetic singing
Research led by Western Sydney University, Australia, has found that boys singing in a choir engage in simultaneous group cohesion and sexually motivated competition exhibited through voice modulation in the presence of a female audience......»»
17th-century anti-décolletage campaign was form of misogyny, author asserts
A 17th century French clerical/commercial campaign against décolletage—fashions in which women reveal the cleavage between their breasts—was motivated more by misogyny than moral outrage, according to a University of Kansas scholar......»»