Remove industry-news vulnerable-people-exposed-red-cross
article thumbnail

Fixing Data Breaches Part 3: The Ease of Disclosure

Troy Hunt

What I'm talking about here is ensuring that when someone wants to report something of a security nature - and that could be anything from a minor vulnerability through to a major data breach - that channels exist to easily communicate the issue with the organisation involved. That's one of the things that needs to change in this industry.

article thumbnail

The Unseen Threats: Anticipating Cybersecurity Risks in 2024

Security Boulevard

It can feel like crossing a major highway while blindfolded. This is the normal cadence the industry expects and although difficult to keep pace, the cybersecurity world is able to tread these waters. There is a method to the madness of trying to forecast such a complex and muddled industry. 2024 Cybersecurity Predictions 1.

Risk 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

In other words, Peloton suffered from an API vulnerability that could potentially lead to a massive data breach. Here's Eric Wilde and his guests, Francoise Lascelles on Getting API's to Work podcast discussing the Peloton vulnerability. That kind of makes Jason a one person red team. Okay, that's starting to get very personal.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

In other words, Peloton suffered from an API vulnerability that could potentially lead to a massive data breach. Here's Eric Wilde and his guests, Francoise Lascelles on Getting API's to Work podcast discussing the Peloton vulnerability. That kind of makes Jason a one person red team. Okay, that's starting to get very personal.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. More individual states’ voting systems were exposed and also addressable from the internet.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. More individual states’ voting systems were exposed and also addressable from the internet.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. More individual states’ voting systems were exposed and also addressable from the internet.

Hacking 40