Group-IB, a threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked online on March 17, 2021. The database was posted on a different underground forum and contained 12,344 records of the card shop admins, sellers and buyers including their nicknames, hashed passwords, contact details, history of activity, and current balance.
The International Foundation for Protection Officers (IFPO) in partnership with Perpetuity Research has opened up a study to explore the roles, responsibilities and training of frontline Security Officers (sometimes referred to as security guards).
Since January, conditions across the U.S. have been running warmer and wetter than normal. The nation also recorded its first billion-dollar weather and climate disaster of 2021 — the deadly deep freeze that enveloped much of the central U.S. in February — and two tornado outbreaks in late March.
One of the largest Sea Bass and Bream fish farms in the Mediterranean for sustainable aquaculture, Avramar, wanted to improve the security arrangements of the farms, to ensure that both their assets and their employees were well protected.
Apple announced it will start enforcing a new privacy notification rule that digital advertising firms such as Facebook have warned will hurt their profits.
The Vanderbilt University Public Safety team is reminding students and staff that it exists to keep them as safe as possible and provide a welcoming educational environment.
A new CISCO Talos Intelligence report explores how cybercriminals are increasingly abusing the communications platforms that many organizations use to facilitate employee communications. According to the report, communication platforms have allowed attackers to circumvent perimeter security controls and maximize infection capabilities. Over the past year, adversaries are increasingly relying on these platforms as part of the infection process.
Researchers at Rapid7 evaluated five areas of cybersecurity that are both critical to secure to continue doing business on and across the internet, and are squarely in the power of CISOs, their IT security staffs, and their internal business partners to address, in their new round of Internet Cyber-Exposure Reports (ICERs). These five facets of internet-facing cyber-exposure and risk include: