Identity & Access Management

How Did Hackers Steal 1 Billion Records from Salesforce?
Cloud Security & Compliance How Did Hackers Steal 1 Billion Records from Salesforce?

In a digital landscape increasingly fraught with cyber threats, a staggering claim has emerged that could redefine the boundaries of data security breaches, shaking trust in corporate systems worldwide. A cybercriminal coalition known as Scattered LAPSUS$ Hunters has asserted that they have

Discord Data Breach Exposes User IDs and Personal Info
Cloud Security & Compliance Discord Data Breach Exposes User IDs and Personal Info

In an alarming turn of events, a significant data breach has struck a popular communication platform, compromising the personal information of numerous users who rely on the service for gaming, socializing, and professional collaboration. This incident, stemming from a security lapse at a

How Do Cloud Mining Platforms Cut Costs Before Halving?
Cloud Security & Compliance How Do Cloud Mining Platforms Cut Costs Before Halving?

As the Bitcoin halving looms on the horizon, an event that will slash block rewards from 6.25 BTC to 3.125 BTC per block, miners are grappling with the harsh reality of shrinking profit margins and extended timelines for recovering their investments. This cyclical phenomenon, occurring roughly

Can Pixnapping Steal Your 2FA Codes on Android Devices?
Cloud Security & Compliance Can Pixnapping Steal Your 2FA Codes on Android Devices?

What if a rogue app on your Android device could steal your two-factor authentication (2FA) codes in mere seconds, without a single permission request or suspicious pop-up? This chilling possibility isn’t science fiction but a stark reality with a new attack method called Pixnapping, discovered by

Uncovering Shadow APIs: Risks and Prevention Strategies
Cloud Security & Compliance Uncovering Shadow APIs: Risks and Prevention Strategies

In the fast-evolving landscape of digital transformation, organizations are increasingly reliant on APIs to drive connectivity and innovation across applications and services, but a hidden threat known as shadow APIs lurks beneath this progress. These undocumented or unmanaged endpoints operate

How Did Microsoft and Cloudflare Stop a Major Phishing Threat?
Cloud Security & Compliance How Did Microsoft and Cloudflare Stop a Major Phishing Threat?

What happens when a tool costing just a few hundred dollars can turn anyone into a cybercriminal capable of stealing thousands of passwords? This chilling reality came to light when a sophisticated phishing platform threatened millions of internet users worldwide, prompting two technology

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later