article thumbnail

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

The Last Watchdog

It’s the glue holding digital transformation together. Related: A primer on ‘credential stuffing’ APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are literally everywhere in the digital landscape, and more are being created every minute. We spoke at RSA 2020.

Mobile 266
article thumbnail

RSAC insights: How IABs — initial access brokers — help sustain, accelerate the ransomware plague

The Last Watchdog

Related: How cybercriminals leverage digital transformation. They’ve even got an escrow system to assure that one criminal is not scamming the other criminals.”. Understanding digital assets. This is the flip side of digital transformation. Things are steadily moving in that direction.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps and API services that organizations are increasingly embracing, in order to stay in step with digital transformation. Related: The ‘Golden Age’ of cyber espionage is upon us.

article thumbnail

Handling Pandemic Burnout While Balancing Digital Lifestyles and Cybersecurity

Hot for Security

.” Helping millions cope with conditions of the new normal, the digital world has become an indispensable tool that continues to develop while both hurting and helping society. The Internet seems to be the indispensable medium in which we live, and at the same time, it has become an extension of our mind.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

As part of the rush to leverage the Internet cloud to transact with remote workers, third-partner suppliers and customers, companies opened up endless fresh attack vectors. This pilfered data, in turn, has been channeled into all manner of business scams , consumer fraud, election tampering and cyber espionage. I’ll keep watch.

CISO 185
article thumbnail

FBI warns of ransomware gang – What you need to know about the OnePercent group

CyberSecurity Insiders

The acceleration of digital transformation has also left companies with less transparency and fewer relevant security insights as the implementation of multiple new services and systems led to widespread fragmentation. How to spot their scam and protect yourself.

article thumbnail

Black Hat insights: The retooling of SOAR to fit as the automation core protecting evolving networks

The Last Watchdog

Covid 19 turned out to be the best digital transformation initiative ever,” Cornell says. “It Phishing scams, supply chain attacks and ransomware extortion — all pivoting, in one way or another, off the shifting operating environment – spiked. At the moment, a lot of organizations are in this boat.