article thumbnail

Let’s Encrypt to revoke “mis-issued” certificates

Malwarebytes

If you use a Let’s Encrypt SSL/TLS certificate, you may wish to check your account over the coming days. The onset of mass free HTTPS certificates has, interestingly, meant a few tweaks being applied to infosec advice realms. What’s happened with Let’s Encrypt? What’s the deal with free certificates?

article thumbnail

Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma

Security Boulevard

In this episode, we explore the arrival of passwordless Google accounts that use “passkeys,” which offer enhanced usability and security. The post Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Your Work Email Address is Your Work's Email Address

Troy Hunt

Not just infosec headlines or tech headlines, but the headlines of major consumer media the likes my mum and dad would read. Let's start with a poll: At your place of work, does your employer have the right to access the contents of your corporate email account if necessary? Have an affair."

article thumbnail

Ransomware gang hits 49ers’ network before Super Bowl kick off

Malwarebytes

infosec #cybersecurity #threatintel #cyber #NFL pic.twitter.com/tl7OWM2Aqf — CyberKnow (@Cyberknow20) February 12, 2022. It is used by affiliates who breach organizations, steal valuable information, and then use ransomware to encrypt the organizations’ files—rendering them unusable. Smart marketing tbh.

article thumbnail

Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices

Thales Cloud Protection & Licensing

One of the most common ways by which malicious actors perpetrate account takeover (ATO) fraud is via password brute forcing attacks. Once they’re in, malicious actors can leverage a compromised business account to steal sensitive information and/or stage secondary attacks. Employ Device Encryption.

article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec. Accounting is repeatable. The arcane.

InfoSec 180
article thumbnail

The bad old days

Javvad Malik

We only had Infosec Europe and the most we got out of there was some free USB sticks… If we were lucky they would be 500 megs. It’s so easy to manipulate anyone that works in infosec. Yeah, infosec is full of characters. Privilege Account Management. A lotta things have changed since those days.

Passwords 113