article thumbnail

Faulty DoD Cybersecurity Leaves U.S. At Risk of Missile Attacks

Adam Levin

The report issued by the Inspector General’s office details several basic lapses in security protocols at five separate locations, including: A lack of multifactor authentication to access BMDS technical information. Known and unpatched network vulnerabilities dating back as far as 1990. No physical locks on server racks.

Risk 199
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. Mimecast Email security 2012 Nasdaq: MIME. a16z Investments. Bessemer Venture Partners. Greylock Partners.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Advanced threat predictions for 2023

SecureList

The cyber-offense ecosystem still appears to be shaken by the sudden demise of NSO Group; at the same time, these activities indicate to us that we’ve only seen the tip of the iceberg when it comes to commercial-grade mobile surveillance tooling. We believe that research into mail software vulnerabilities is only getting started.

Firmware 111
article thumbnail

APT trends report Q3 2023

SecureList

This strategic shift signals its intent to intensify its surveillance capabilities and expand its range of targets. StrongyPity (aka PROMETHIUM) is a Turkish-speaking threat actor known to have been active since at least 2012.

article thumbnail

Facebook May Have Gotten Hacked, and Maybe It’s Better We Don’t Know

Adam Levin

A week after it landed with a curious (and most likely spurious) thud, Zuckerberg’s announcement about a new tack on consumer privacy still has the feel of an unexpected message from some parallel universe where surveillance (commercial and/or spycraft) isn’t the new normal.

Hacking 100
article thumbnail

CISSPs from Around the Globe: An Interview with James Wright

CyberSecurity Insiders

With the introduction of Apple's iOS 8, new system-level security abilities emerged, including the ability to use TouchID for several authentication scenarios. I was a delegate to Unitarian Universalist General Assembly, the church's international leadership body, in 2012. As a Unitarian Universalist or U.U.,