article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder’s appropriate security level. A sample Common Access Card (CAC). Millions of U.S.

article thumbnail

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Also, WhiteHat has been generating this report annually since 2006. The fact that more companies are participating in the hunt for security flaws in new apps is a good thing. Related: The tie between DevOps and SecOps.

Security 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenSubtitles data breach impacted 7 million subscribers

Security Affairs

The attacker also offered his support to OpenSubtitles to address the security flaws he has found on the website. Administrators of the website agreed to pay the ransom due to the low amount, but after receiving the ransom, the attackers never helped them to secure the website and on 11 January 2022 they leaked the data online.

article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

Security firm FireEye dubbed that hacking blitz “one of the broadest campaigns by a Chinese cyber espionage actor we have observed in recent years.” Security analysts and U.S.

article thumbnail

CSPM vs CWPP vs CIEM vs CNAPP: What’s the Difference?

eSecurity Planet

As cloud computing evolves, so has cloud security, and buyers in the market for cloud security solutions may find themselves facing a dizzying array of acronyms, like CNAPP, CWPP, CSPM, and CIEM. Securing all those new cloud environments and connections became a job for cybersecurity companies.

Cloud 97
article thumbnail

IBM X-Force Exchange Threat Intelligence Platform

eSecurity Planet

The top-ranked IBM X-Force Exchange threat intelligence platform (TIP) integrates enterprise-grade external security threat information with the tools a security professional needs to analyze how the threat might impact the organization. This article provides more in-depth information on the product and its features.

Retail 87
article thumbnail

A Light at the End of Liberty Reserve’s Demise?

Krebs on Security

” The government says from 2006 until the service’s takedown, Liberty Reserve processed an estimated 55 million financial transactions worth more than $6 billion, with more than 600,000 accounts associated with users in the United States alone.