Quick Glossary: DevSecOps

The way software is developed has changed. DevSecOps is transforming the industry by incorporating security from the early stages and automating traditional processes to build better, faster and more secure software. Ray Fernandez, writing for TechRepublic Premium, presents this DevSecOps glossary to help you navigate the modern world of software development and enhance your understanding. …

Read More

Patch Tuesday

What is Patch Tuesday? Patch Tuesday is the commonly known name of Microsoft’s monthly release of security fixes for the Windows operating […]

Read More

The Post Millennial – 26,818,266 breached accounts

In May 2024, the conservative news website The Post Millennial suffered a data breach. The breach resulted in the defacement of the website and links posted to 3 different corpuses of data including hundreds of writers and editors (IP, physical address and email exposed), tens of thousands of subscribers to the site (name, email, username, phone and plain text password exposed), and tens of millions of email addresses from several thousand mailing lists alleged to have been used by The Post Millennial (this has not been independently verified). The mailing lists appear to be sourced from various campaigns not necessarily run by The Post Millennial and contain a variety of different personal attributes including name, phone and physical address (depending on the campaign). The data was subsequently posted to a popular hacking forum and extensively torrented.

Read More

Tappware – 94,734 breached accounts

In April 2024, a substantial volume of data was taken from the Bangladeshi IT services provider Tappware and published to a popular hacking forum. Comprising of 95k unique email addresses, the data also included extensive labour information on local citizens including names, physical addresses, job titles, dates of birth, genders and scans of government issued national identity (NID) cards.

Read More
Beyond Blue and Red Teaming: How Anyone Can Have a Career in Cybersecurity

Beyond Blue and Red Teaming: How Anyone Can Have a Career in Cybersecurity

Contrary to what many people imagine, the figure in a dark hoodie sitting in front of a glowing computer screen is not the face of a career in cybersecurity. In an overwhelmingly digital world, cyber adversaries can target a vast attack surface. Threats are pervasive. Every point across an organization’s attack surface must be protected. There are thousands of pieces that must successfully work together to do that—which takes people with varied expertise.

Read More
X