Topic: data encryption

  • Who Else Has Access to Your Wearable's Heartbeat Data?

    Who Else Has Access to Your Wearable's Heartbeat Data?

    The proliferation of smartwatches and connected medical devices enables remote health monitoring and personalized care, but it also introduces significant security vulnerabilities due to the constant flow of sensitive data. Ambiguity in health data ownership and sharing practices raises privacy c...

    Read More »
  • F5 Hack Puts Thousands of Networks at Imminent Risk

    F5 Hack Puts Thousands of Networks at Imminent Risk

    A sophisticated nation-state hacking group breached F5's network, exposing proprietary source code and undisclosed vulnerability data, endangering thousands of government and corporate networks that rely on BIG-IP appliances. The attackers maintained persistent access for years, gaining control o...

    Read More »
  • Satellites Are Leaking Your Private Data: Calls, Texts, and Secrets

    Satellites Are Leaking Your Private Data: Calls, Texts, and Secrets

    Researchers found that approximately half of geostationary satellite signals are unencrypted, allowing interception of sensitive communications like phone calls and military data with basic equipment. Using affordable hardware, the team captured private data including T-Mobile customer communicat...

    Read More »
  • SonicWall VPN Breach: Hackers Exploit Stolen Credentials

    SonicWall VPN Breach: Hackers Exploit Stolen Credentials

    Attackers breached over 100 SonicWall SSLVPN accounts using stolen credentials, with malicious activity detected from October 4th to at least October 10th by Huntress. The intrusions utilized previously compromised valid credentials, not brute-force methods, and involved network reconnaissance an...

    Read More »
  • Business Leaders Demand New Paths to AI Value and Trust

    Business Leaders Demand New Paths to AI Value and Trust

    Business leaders are universally adopting AI but face trust and governance barriers that limit implementation beyond experimental stages, prompting increased investment in observability solutions. Security applications are a major focus of AI investment, with most organizations using AI for compl...

    Read More »
  • Avnet Data Breach: Stolen Data Deemed Unreadable

    Avnet Data Breach: Stolen Data Deemed Unreadable

    Avnet confirmed a data breach involving externally hosted cloud storage, where unauthorized individuals accessed a database for an internal sales application in the EMEA region, but the proprietary platform itself was not compromised. The company detected the intrusion on September 26, immediatel...

    Read More »
  • Futurex & Spire Solutions Bring Enterprise Encryption to Middle East & Africa

    Futurex & Spire Solutions Bring Enterprise Encryption to Middle East & Africa

    Futurex and Spire Solutions have formed a strategic alliance to enhance the availability of advanced data protection services in the Middle East and Africa, combining Futurex's encryption technologies with Spire's regional expertise. The partnership addresses the growing demand for cybersecurity ...

    Read More »
  • Google Analytics Adds Unnormalized Benchmarking Data

    Google Analytics Adds Unnormalized Benchmarking Data

    Google Analytics has expanded its Benchmarking feature with twenty new unnormalized metrics, such as New Users and Total Revenue, enabling businesses to compare actual performance numbers against industry peers. The system calculates fair benchmark ranges using peer group data adjusted for your a...

    Read More »
  • UK Renews Push for Apple to Unlock Encrypted iCloud Data

    UK Renews Push for Apple to Unlock Encrypted iCloud Data

    The UK government is pressuring Apple to create access to encrypted iCloud data for British users, despite previous claims that such efforts had stopped. Apple has removed its Advanced Data Protection feature from the UK market and reaffirmed its commitment to not building backdoors into its serv...

    Read More »
  • Genetec Adds Audio to Security Centre SaaS

    Genetec Adds Audio to Security Centre SaaS

    Genetec Inc. has integrated cloud-native audio communications into its Security Centre SaaS platform, enhancing real-time voice capabilities alongside existing video surveillance, access control, and intrusion monitoring in a unified system. This integration allows security teams to verify identi...

    Read More »
  • Get Paid $30/Day to Record Calls for AI: Is It Worth It?

    Get Paid $30/Day to Record Calls for AI: Is It Worth It?

    Neon - Money Talks is a free app that pays users for recording their phone conversations, which are then sold as anonymized data to AI companies for training language models. The app records only calls made through it, with a tiered payment system offering up to 30 cents per minute, and includes ...

    Read More »
  • Decoding the .7ga9lt4bur7 Ransomware (Mimic/Pay2Key)

    Decoding the .7ga9lt4bur7 Ransomware (Mimic/Pay2Key)

    A sophisticated ransomware attack has encrypted critical business files and exfiltrated sensitive company data, including employee records and financial documents. The attackers demand payment for a decryption tool and threaten to publish the stolen data, which could lead to regulatory fines, law...

    Read More »
  • Unmasking the .7ga9lt4bur7 File: A Mimic/Pay2Key Ransomware Threat

    Unmasking the .7ga9lt4bur7 File: A Mimic/Pay2Key Ransomware Threat

    A new ransomware threat uses the **.7ga9lt4bur7 extension** to encrypt files and demands payment to prevent stolen data from being published. Attackers exfiltrate sensitive information before encryption, including employee records and financial documents, risking severe fines and reputational dam...

    Read More »
  • New Ransomware Encrypts Files with .enc, .iv, and .salt Extensions

    New Ransomware Encrypts Files with .enc, .iv, and .salt Extensions

    A new ransomware strain encrypts files with .enc, .iv, and .salt extensions and demands Bitcoin payment to prevent public release of stolen data, claiming purely financial motives. The attackers emphasize their reputation for providing decryption tools and deleting data after payment to maintain ...

    Read More »
  • Top Infosec Products Launched This Week: September 12, 2025

    Top Infosec Products Launched This Week: September 12, 2025

    Several leading vendors launched innovative security tools this week, addressing key areas such as vendor risk management, data encryption, threat detection, and AI governance. Cynomi's TPRM platform significantly reduces vendor assessment times by up to 79%, boosting operational efficiency and p...

    Read More »
  • Identify and Remove E83myizMA.README.txt Ransomware

    Identify and Remove E83myizMA.README.txt Ransomware

    A file named E83myizMA.README.txt indicates a ransomware infection that has encrypted your personal files, demanding payment for decryption. The attackers provide contact emails and a unique ID to calculate the ransom, request payment in USDT cryptocurrency, and offer to decrypt one file as proof...

    Read More »
  • AI's Success Hinges on Trusted, Well-Governed Data

    AI's Success Hinges on Trusted, Well-Governed Data

    Many businesses are struggling to implement AI effectively due to a lack of trusted, well-governed data, which is essential for reliable and secure outcomes. A significant challenge is the complexity and security risks associated with unstructured data, with many organizations citing budget const...

    Read More »