Microsoft and Okta Targeted by LAPSUS$
Microsoft and Okta, a provider of authentication services, said they are looking into claims of a possible breach made by LAPSUS$.
Microsoft and Okta, a provider of authentication services, said they are looking into claims of a possible breach made by LAPSUS$.
Wondering what the first steps should be to reclaim and protect your privacy ? Do you know the best steps to advise someone learning about online privacy to take? Do you want to assist someone in your family or friends? If so, this blog is for you.
Mobile Application Penetration Testing often has a different flow to web application or network testing. This is because not only do you get an application but you also get the software itself. This runs on a device you control and allows for a much wider attack surface. It also allows DE compilation of code and hooking of calls all in service of attacking the application. As such, mobile app pentesting requires an entirely different skill set, knowledge base and methodology. Most mobile application penetration tests rely on the OWASP-MASVS (Mobile Application Security Verification Standard). Senior application developers and hackers are responsible for developing this to ensure that applications meet minimum security requirements. The content in this blog comes from the OWASP-MSTG which is one of the most complete methodologies available.
In this article, we define cyber awareness training and its growing importance for business of all levels.
Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key. How are wireless networks … Read more
Unfortunately, using just one or a combination of the most common and predictable password traits makes you an easy target for a malicious hacker – and not necessarily a particularly skilled one. But, should you use a password manager?
Passwords are often the weakest part of an organisation’s or individual’s security. Often passwords are easy to guess, reused, or stored improperly, meaning a hacker with enough skill can gain access to
In this article we will outline what is meant by physical security in the context of cyber security. We will have a look at the top ten best practices for securing your environment physically. Most of these you may think are common sense. However, you really would be amazed to discover how many reputable
Regular penetration testing is becoming increasingly important. What many business owners seem to want to know, however, is when to arrange a system test. Any application that processes personal data, whether in the storing or retrieving personal data, needs to have its security tested regularly according to GDPR Article 32 (1.D). Many systems have never … Read more
GDPR gives the control of personal data back to the person it belongs to. This, in turn, ensures a safeguard for peoples’ privacy as a basic human right. It is important for companies to be aware of and adhere to as there are tough financial penalties for non-compliance.