Welcome to Information Security Buzz

InfoSec Experts Commentary On Recent News and Topics

Articles

Nissan data breach caused by vendor-exposed database
Articles
Dan.Garcia

How To Pursue Database Encryption

Cybersecurity remains a continual battle, with data breaches occurring at PayPal and T-Mobile in the first month of 2023 alone.

Security Solution Gudies

News & Analysis

Rundown Of News And Events That Happened This Week

Rundown Of News And Events That Happened This Week

Here is the rundown of news and events that happened this week in the world of cybersecurity. FBI Detains Owner Of Notorious Cybercrime Forum, BreachForums …

GitHub Replaces Exposed RSA SSH Key To Keep Git Operations

GitHub Replaces Exposed RSA SSH Key To Keep Git Operations

After unintentionally publishing its private SSH key, GitHub.com rotated it. The software development and version control provider took action out of “an excess of caution” …

WooCommerce Payments Plugin Patches Critical Vulnerability 

WooCommerce Payments Plugin Patches Critical Vulnerability 

Developers of the popular WooCommerce payments plugin recently identified a critical security flaw that could have affected over 500,000 WordPress sites. The plugin, developed by Automattic, offers …

Web Application Firewall

City Of Toronto Admits Data Theft, Clop Takes Blame

The City of Toronto has acknowledged today that a third-party vendor did provide unlawful access to Municipal data in the City of Toronto. Access is …

New Government Cyber Security Strategy Vital For Healthcare

New Government Cyber Security Strategy Vital For Healthcare

The Senate Homeland Security Committee cleared legislation on March 30, 2022, aimed at enhancing the cyber readiness of the U.S. healthcare sector. The proposed “Healthcare …

German and South Korean Agencies Alerts of Kimsuky's Attacks

German and South Korean Agencies Alerts of Kimsuky’s Attacks

German and South Korean intelligence agencies have issued a joint warning against the increasing cyber-attack tactics of a North Korean hacker group called Kimsuky. The …

Research & Study

Security 360 Reports Shows That Threat Actors Are Targeting BYOD And Company Devices

Jamf Threat Labs reveals that organisations are still using out-of-date software on devices, exposing them to cyber threats Jamf (NASDAQ: JAMF) today announced the release of its latest Security 360 Report analysing the threats impacting devices used in the modern workplace. A significant finding from the report is that 1 in every 5 devices ran an

Developing a Security Strategy

Global State Of Cyberwarfare Study

Only one-third of UK organisations have a validated plan in place to handle cyberwarfare; and 57% have stalled or stopped digital transformation projects due to

By Domains

application-2
Application Security
data-protection-2
Data Protection
cloud-security-10
Cloud Security
Hole in Facebook Security
Identity & Access Management
leadership-2
CISO
Ransomware-2
Ransomware