Latest Entries »

In January 2019, researchers from Anomali Labs and Saudi Telecom Company (STC) observed a spike in phishing websites impersonating the Saudi Arabian Ministry of Interior’s e-Service portal known as “Absher”. Further analysis uncovered a broader phishing campaign targeting four different Kingdom of Saudi Arabia government agencies and a single Saudi-based financial institution. View full article »

Until a report this week, Uber’s Surfcam’s use was thought to be limited to incidents uncovered in Singapore in 2017. For its part, Uber denies that it’s a “spyware.”

View full article »

Formulus Black has proposed a way to make x86 servers run faster, using a data-reduction method. Its software can run on bare-metal machines, and in virtual boxes in public clouds, such as Amazon and Azure. View full article »

In November of 2018, we published the cornerstone report  “Inside Magecart,” in which we disclosed the existence of seven distinct Magecart groups and described in detail their operations and the different ways they skim payment information. Since then, we’ve detailed even more groups, such as Group 11 and Group 12. View full article »

We’ve now seen Magecart conduct numerous high-profile digital credit card-skimming attacks against major international companies to win unprecedented attention. Alongside British Airways, these attacks affected other brand names like Ticketmaster and Newegg. View full article »

Magecart is more than just a security problem—it’s also a business problem.

When threat actors breached British Airways in September resulting in the compromise of thousands of customers’ credit cards, the world got a look at what the fallout of a modern security breach looks like. Immediately afterward, a law firm launched a £500 million class action suit. On top of that, under GDPR, firms found liable for a breach can be fined up to 4% of turnover, or £500 million in British Airways’ case. View full article »

The rapid adoption of containers in the enterprise represents a unique opportunity to shift security left. As a security leader, are you taking advantage of this opportunity? In a previous post, we discussed the intrinsic link between containers and public cloud. In this post, I’ll explain why containers represent one of the most vital opportunities to bridge the divide between development and security teams. View full article »

A now-patched vulnerability in the web version of Facebook Messenger allowed any website to expose who you have been messaging with.

View full article »

Docker is a technology that allows you to perform operating system level virtualization. An incredible number of companies and production hosts are running Docker to develop, deploy and run applications inside containers. View full article »

A now-patched vulnerability in the web version of Google Photos allowed  malicious websites to expose where, when, and with whom your photos were taken.

View full article »