The Latest in IT Security

Posts Tagged ‘cyber threats’

For example, The Economist featured an ominous cover story: “Why computers will never be safe.” It’s a common worry. Since APIs by definition govern access to important data, any concerns about data security lead inevitably to questions about API security. This focus will continue to become increasingly top of mind as more APIs are created, published and used in the growing API-first world.

Read more ...

Atlassian reset user passwords for its group chat service HipChat on Monday following an incident that may have resulted in unauthorized access to a server used by the service.
The company began warning users Monday via email that as a result an attacker may have secured access to user information, including names, email addresses and hashed passwords.

Read more ...

Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 in a public report by RapidityNetworks. One month later we saw the first samples being uploaded from Spain to VT. This worm builds a huge P2P botnet (almost 300,000 devices at the time of publishing this blogpost), but its real purpose remains unknown.

Read more ...


Categories

THURSDAY, MAY 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments