Tag: data breach

burning lock image

IoCs vs. EoCs: What’s the difference and why should you care?

Security analysts and threat hunters know the importance of IOCs – indicators of compromise. But EOCs – enablers of compromise – are just as important.

User Identity Image

Episode 211: Scrapin’ ain’t Hackin’. Or is it?

Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse?

Zoom Security

Exclusive: Flaws in Zoom’s Keybase App Kept Chat Images From Being Deleted

A serious flaw in Zoom’s Keybase secure chat application left copies of images contained in secure communications on Keybase users’ computers after they were supposedly deleted.

United Nations Logo on a Glass Door

Researchers Test UN’s Cybersecurity, Find Data on 100k

Independent security researchers testing the security of the United Nations were able to compromise public-facing servers and a cloud-based development account for the U.N. and lift data on more than 100,000 staff and employees, according to a report released Monday.

Episode 176: Security Alarms in Census II Open Source Audit. Also: The New Face of Insider Threats with Code42

Joe Payne the CEO of Code42 joins us to talk about how the challenge of data breach prevention is changing. And: we do a deep dive on the recent Census II audit of open source.