Remove en company corporate-policies
article thumbnail

Million password resets and 2FA codes exposed in unsecured Vovox DB

Security Affairs

” Vovox promptly took down the database after TechCrunch informed the company with an inquiry. . ” Vovox promptly took down the database after TechCrunch informed the company with an inquiry. It has been estimated that the exposed archive included at least 26 million text messages year-to-date. ” reported Techcrunch.

article thumbnail

Drawing the RedLine – Insider Threats in Cybersecurity

Security Boulevard

The first mention of this malware appears to be in early 2020 , when multiple phishing campaigns cast a wide net over thousands of users, offering RedLine en masse. Also on March 22nd, Okta confirmed that the RedLine malware attack they faced from Lapsus$ about two months prior may have compromised over 366 of their corporate customers.

article thumbnail

IoT Secure Development Guide

Pen Test Partners

Figure 4: Example attack tree for running malicious code Step 5: Derive security requirements This is often where business policies and organisational requirements start to factor in: Is there an obligation to protect intellectual property (IP) in the firmware of devices? Have a vulnerability disclosure policy (VDP). Validate input.

IoT 52