article thumbnail

How a Common API Vulnerability Might Have Cost Telco Optus $1 Million

Security Boulevard

According to the OWASP API Security Top 10, broken user authentication constitutes the second biggest API vulnerability. Growing API Usage in Telco Sector Increases Security Risks. ISPs require strong authentication to protect their devices and their data. Moreover, the risk extends far beyond data exfiltration.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

Microsoft is already providing passwordless features to Azure Active Directory, and for Google, multi-factor authentication (MFA) has become mandatory. While big tech phases in new authentication solutions, Dashlane — a password manager used by more than 20,000 companies and more than 15 million users — made a full switch.

Passwords 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

There exists a class of tiny and highly maneuverable devices that introduce a variety of cybersecurity risks you probably haven’t considered before. According to research firm Statista, the global retail drone market is expected to reach $90 billion by 2030, with Defense, Enterprise, and Logistics being the primary industries driving growth.

article thumbnail

The Power of Diversity: Building Stronger Cybersecurity

IT Security Guru

The underrepresentation of certain groups, including women, minority communities, and individuals with diverse backgrounds, not only deprives the industry of valuable perspectives, innovative ideas and thought leadership, but also poses a significant risk to our collective safety.

article thumbnail

Grip Security Blog 2022-10-18 14:15:42

Security Boulevard

And by the year 2030, some experts predict ungoverned SaaS (business-led SaaS) will represent over 80% of the total SaaS estate. And what is more concerning is how the SaaS service layer can create systemic cloud risk, because of the unmatched privilege to control business and information systems via SaaS services.

article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

Essentially the business will see what the risk tolerance is for all these items, and that’s what the Ops team will monitor in their dashboards. This will include things like cloud configurations for open protocols, open ports, authenticated entities, encryption at rest, encryption in transit, who is accessing what items, etc.

InfoSec 180
article thumbnail

Gaming-related cyberthreats in 2023: Minecrafters targeted the most

SecureList

By the year 2030, this worldwide total is expected to more than double to US$583.69 Methodology To gain an insight into the current landscape of gaming-related cybersecurity risks, Kaspersky has conducted extensive research into prevalent threats targeting the gaming community. percent more than last year.

Mobile 97