Peloton APIs Exposed User Data

Peloton APIs Exposed User Data

A security researcher has discovered several issues with the software used by exercise equipment maker Peloton, which may have leaked sensitive customer information to unauthenticated users. Pen Test Partners explained in a new blog post that the problem could be traced back to unauthenticated API endpoints, which could have allowed hackers to interrogate  information on all users. Among the potentially exposed data was user and instructor IDs, group membership, location, workout stats, gender and age,…

Read More

Healthcare CIOs fear (and fend off) ransomware threats amid pandemic

Healthcare CIOs fear (and fend off) ransomware threats amid pandemic

Mt. San Rafael Hospital thwarted a ransomware attack on one of its sister facilities earlier this year before anything could be compromised. The organization is still working through the details of the hack, says CIO Michael Archuleta, whose hospital is part of the BridgeCare Health Network, which includes five hospitals in Colorado. “It could have been a bad issue if we didn’t have the automation and intelligence to catch and stop it,” says Archuleta. The…

Read More

The top three collaboration security misses by CISOs

The top three collaboration security misses by CISOs

The top three collaboration security misses by CISOs | 2021-05-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Corporate boards are better at cybersecurity but still need improvement

Corporate boards are better at cybersecurity but still need improvement

Corporate boards are better at cybersecurity but still need improvement | 2021-05-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

7 things every CISO must know about ransomware

7 things every CISO must know about ransomware

7 things every CISO must know about ransomware | 2021-05-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Driving an inclusive recovery: How can Europe secure a digital and sustainable future for all? – Cisco Blogs

Driving an inclusive recovery: How can Europe secure a digital and sustainable future for all? – Cisco Blogs

I recently took part in a panel discussion on driving an inclusive recovery, which focused on how we create a digital and sustainable future for all in Europe. It was great to be part of a discussion that talked about what recovery might look like rather than focusing on how we need to respond to the day-to-day challenges and the harsh environment that the pandemic continues to bring to both our professional and our private…

Read More

Video: How to Dockerize a Python App with FastAPI – Docker Blog

Video: How to Dockerize a Python App with FastAPI – Docker Blog

Join host Peter McKee and Python wizard Michael Kennedy for a warts-and-all demo of how to Dockerize a Python app using FastAPI, a popular Python framework. Kennedy is a developer and entrepreneur, and the founder and host of two successful Python podcasts — Talk Python To Me and Python Bytes. He’s also a Python Software Foundation Fellow. With some skillful back-seat driving by McKee, Kennedy shows how to build a bare-bones web API — in…

Read More

McAfee Proactive Security Proves Effective in Recent MITRE ATT&CK™ | McAfee Blogs

McAfee Proactive Security Proves Effective in Recent MITRE ATT&CK™ | McAfee Blogs

McAfee Soars with Superior Protection Results    Bottom Line: McAfee stopped the MITRE ATT&CK Evaluation Carbanak and FIN7 threats in their tracks within the first 15% of the major steps of the attack chain (on average), delivering on a critical security operations center (SOC) strategy: Stop the attack as early as possible.   In April 2021, MITRE Engenuity released the results of the Carbanak and FIN7 evaluations that leveraged Tactics, Techniques, and Procedures (TTP’s) from the MITRE ATT&CK framework. McAfee and 28 other vendors tested the capabilities of…

Read More

IBM embraces zero trust with upgraded Cloud Pak service

IBM embraces zero trust with upgraded Cloud Pak service

IBM has taken the wraps off a version of its Cloud Pak for Security that aims to help customers looking to deploy zero-trust security facilities for enterprise resource protection. IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of private or public infrastructure, including AWS, Microsoft Azure, Google Cloud Platform,…

Read More

Security teams plan a new pandemic quarantine for BYOD devices headed back to the office

Security teams plan a new pandemic quarantine for BYOD devices headed back to the office

A survey from Blackberry finds that IT departments are worried about unpatched devices connecting to corporate networks as offices reopen. Security professionals are bracing for the next phase of the remote work reality: personal devices coming back into the office and bringing along all the associated security risks. A new survey from Blackberry found that many IT teams are planning to quarantine laptops for scans and patching before allowing them to reconnect to the network….

Read More
1 3,885 3,886 3,887 3,888 3,889 4,321