Remove industry-news t-mobile-data-breach-now-even-bigger
article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it.

Mobile 348
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Or even basic low level threat analysis. Typically they have a greater span of control across the platform and the capability capability across the platform in the industry as a whole. But even they need that additional help. They are all very interested in this right now and very receptive to any advice we want to give.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

After breaches like SolarWinds, companies pledge to improve their digital hygiene. What if they don’t? Unfortunately, in the world of medical devices, such stories aren’t uncommon. I mean, what happens if, in the middle of a global pandemic, someone decides to go after medical devices or even hospitals themselves?

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

After breaches like SolarWinds, companies pledge to improve their digital hygiene. What if they don’t? Unfortunately, in the world of medical devices, such stories aren’t uncommon. I mean, what happens if, in the middle of a global pandemic, someone decides to go after medical devices or even hospitals themselves?

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

Simon Moffatt from CyberHut joins The Hacker Mind to discuss how identity and access management (IAM) is fundamental to everything we do online today, and why even multi-factor access, while an improvement, needs to yield to more effortless and more secure passwordless technology that’s coming soon. Don’t loose it.

article thumbnail

The Critical API Security Gaps in WAAPs

Security Boulevard

Can you really trust a WAAP to secure your critical data and services? Some research firms have even listed WAF as a subset capability of a WAAP. But just because a WAF vendor now says it offers a WAAP does not mean it provides the capabilities needed to deliver on a holistic API security strategy.