Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is It Possible to Erase Yourself from the Internet?

Our digital footprint, the trail of data and information left behind while using the internet, can be overwhelming. It encompasses everything from our social media posts and the websites we have visited to the emails we’ve sent and the online searches we have conducted. With all this information floating around, consumers have a legitimate interest in controlling that flow of information.

Cybersecurity Threats: What You Need to Know About Piggybacking

In cybersecurity, piggybacking refers to an unauthorized person gaining access to a restricted area or system by exploiting the access privileges of an authorized user, typically by following them or leveraging their credentials, usually without their knowledge or consent.

Emerging Threats from Third-Party Breaches: How Financial Fraud and Indirect Ransomware Are Defining Cyber Insurance Trends

Cybersecurity is not merely about firewalls and antivirus anymore—now, your biggest vulnerability might be a third-party vendor. As companies more and more depend on outside partners, third-party hacks have become one of the biggest threats to business security.

Lesson from Blue Shield CA's Google Analytics Breach Risk

On April 9, 2025, Blue Shield of California sent shockwaves through the healthcare industry with a data breach notification revealing that protected health information (PHI) may have been shared with Google Ads for nearly three years due to a misconfigured Google Analytics setup. This incident, affecting an undisclosed number of members, underscores the critical risks of noncompliance with HIPAA rules for online tracking technologies.

Cybersecurity Breaches and Personal Injury: Can Data Leaks Lead to Legal Claims?

When we talk about personal injuries, most people think of car accidents, slip-and-falls, or workplace mishaps. But in today's digital world, there's a new kind of harm, one that strikes when personal data ends up in the wrong hands. Data breaches are no longer rare, and their impact is deeply personal. Behind every compromised account is someone dealing with identity theft, financial loss, or emotional stress.

Oracle Cloud Breach: OAM Exploit & T3 Protocol Clarified

Over the past few days, we have been in direct contact with a hacker who goes by the alias Rose87168. He claims to have breached Oracle Cloud systems, specifically targeting Oracle WebLogic and Oracle Access Manager (OAM). The hacker has provided us with multiple files and data samples, including a tree file and a 10,000-line dataset, which allegedly contain sensitive configuration files, user authentication data, and directory structures from Oracle's infrastructure.

Secure employee offboarding isn't happening fast enough to prevent employee data theft

Departing workers can pose significant risks to data. Let me share a story about an individual who stole and deleted valuable research data right before submitting his resignation: six weeks after a contingent worker left the company, the FBI contacted us. It turned out that the individual had tried to sell the company’s confidential data to a third party. When he left, everything seemed normal.

Safeguarding Classified Information: How to Prevent Insider Data Breaches

Protecting military secrets is critical to national security. It’s not just about securing information; it’s about ensuring our safety and maintaining a strategic advantage. Sweeping legislation, technology, and security protocols are in place to prevent classified information leaks within Defense, which extend down to Defense contractors. However, despite technological advances, humans remain the weakest link when it comes to protecting national secrets.