- Security -

Last update 09.10.2017 13:17:23

HOME  2020  2019  2018  1  2  3  4  5  6


Date

Name

Category

Web

31.3.20

CISOs Suffering From Increasingly Complex Workload: Cisco Security Securityweek

31.3.20

CISO Conversations: Verizon, AT&T CISOs Talk Communications Sector Security Security Securityweek

31.3.20

Distributed disruption: Coronavirus multiplies the risk of severe cyberattac

Security

Net-security

31.3.20

21% of SMBs do not have a data backup or disaster recovery solution in plac

Security

Net-security

31.3.20

Steering your network in the right direction with segmentation

Security

Net-security

31.3.20

The potential impact of SAP security remediation

Security

Net-security
31.3.20

Researchers find shift in monthly web traffic amidst pandemic

Security

Net-security

31.3.20

Remote work and web conferencing: Security and privacy considerations

Privacy  Security

Net-security

30.3.20

Crashing explorer.exe with(out) a click

Security

SANS

30.3.20

Organizations not properly set up to manage risk, coronavirus pandemic reveals

Security

Net-security

30.3.20

Whitepaper: Cloud security risks and how to mitigate them

Security

Net-security

29.3.20

Coronavirus-themed attacks March 22 – March 28, 2020 Security Securityaffairs

29.3.20

Google Advises Against Disabling Sites During the Pandemic Security

Bleepingcomputer

29.3.20

Google Resumes Chrome Releases on an Adjusted Schedule Security

Bleepingcomputer

29.3.20

Google Chrome Adding Option to Always Show Full URLs Security

Bleepingcomputer

29.3.20

Mozilla Firefox Gets a HTTPS Only Mode For More Secure Browsing Security

Bleepingcomputer

29.3.20

TeamViewer Stops Commercial Use Checks in Coronavirus-Affected Regions Security

Bleepingcomputer

28.3.20

Google to Abandon Chrome 82 Development Due to Release Delays Security

Bleepingcomputer

27.3.20 GitHub Paid Out Over $1 Million in Bug Bounties Security Securityweek
27.3.20

While many migrate security tools to the cloud, concerns remain

Security

Net-security

27.3.20

Researchers use AI and create early warning system to identify disinformation online

Security

Net-security
27.3.20

No, Corona Antivirus can’t fight COVID-19

Security

Net-security
25.3.20

Cloud-native security considerations for critical enterprise workloads

Security

Net-security
25.3.20

How to secure customer data for SaaS success

Security

Net-security

25.3.20

Five steps to maintain business continuity during the coronavirus pandemic

Security

Net-security

24.3.20

Another Critical COVID-19 Shortage: Digital Security

Security

SANS

24.3.20

What’s preventing organizations from making pragmatic security decisions?

Security

Net-security

24.3.20

Increasing number of false positives causing risk of alert fatigue

Security

Net-security

24.3.20

Top priorities for business leaders during COVID-19 crisis

Security

Net-security

23.3.20

User Survey 2020 Report Shows Rapid Growth In Apache Pulsar Adoption Security Thehackernews
23.3.20

Crowdsourced pentesting is not without its issues

Security

Net-security

23.3.20

Personal data protection today: We should demand more

Security

Net-security
23.3.20

AI efforts are maturing from prototype to production, but obstacles remain

Security

Net-security

22.3.20

Firefox Reenables Insecure TLS to Improve Access to COVID19 Info Security

Bleepingcomputer

22.3.20

Mozilla to Remove Support for FTP in Firefox

Security

Securityweek

21.3.20

Xbox Live and Support.xbox.com Experiencing an Outage Security

Bleepingcomputer

21.3.20

News Wrap, Coronavirus Edition: WFH Security Woes, Pwn2Own

Security

Threatpost

20.3.20

Cloud Misconfig Mistakes Show Need For DevSecOps

Security

Threatpost

20.3.20

How finance leaders plan to react to COVID-19

Security

Net-security

19.3.20

Cisco addresses multiple issues in its SD-WAN product

Security

Securityaffairs

19.3.20

Too many alarms and too few security analysts? Think SOAR

Security

Net-security

19.3.20

Increase web application security without causing any user disruption

Security

Net-security

19.3.20

Exploring the risky behavior of IT security professionals

Security

Net-security

19.3.20

Organizations still struggle to manage foundational security

Security

Net-security

18.3.20

Sixgill Introduces Dark Web Data Feed Product Security Securityweek

18.3.20

This Stalkerware Delivers Extra-Creepy Features Security

Threatpost

18.3.20

Private Application Access Firm Axis Security Emerges From Stealth Security Securityweek

18.3.20

Security is leaving the data center and moving to the edge

Security

Net-security

17.3.20

Unplanned work makes it hard to deliver digital transformation

Security

Net-security

17.3.20

Guide: Supplier CCPA readiness for security and IT teams

Security

Net-security

16.3.20

How organizations can maintain a third-party risk management program from day one

Security

Net-security

16.3.20

Three actions to boost your organization’s resilience against coronavirus disruptions

Security

Net-security

16.3.20

Early investment in quantum computing could result in a competitive advantage

Security

Net-security

15.3.20

Google Is Not Creating a Nationwide Coronavirus Info Site Security

Bleepingcomputer

15.3.20 Google Chrome Gets 'Default to Guest' Mode for Stateless Browsing Security

Bleepingcomputer

14.3.20 Google Stops Issuing Security Warnings About Microsoft Edge Security

Bleepingcomputer

14.3.20 Working from Home: COVID-19’s Constellation of Security Challenges Security

Threatpost

13.3.20

$100K Paid Out for Google Cloud Shell Root Compromise

Security

Threatpost

13.3.20

Not all Ethernet NICs are Created Equal - Trying to Capture Invalid Ethernet Frames

Security

SANS
13.3.20

How to begin tapping the full value of your data

Security

Net-security
12.3.20

Applying the 80/20 rule to cloud security

Security

Net-security
11.3.20

Facebook Awards $55,000 for Flaw That Could Lead to Account Hijacking

Security

Securityweek
11.3.20

Multi-cloud and edge deployments threatened by security and connectivity problems

Security

Net-security
11.3.20

DNS over HTTPS misuse or abuse: How to stay secure

Security

Net-security
10.3.20

Google Allows Enrolling Security Keys on More Devices

Security

Securityweek
10.3.20

WatchGuard Technologies to Acquire Panda Security

Security

Securityweek
10.3.20

Why a risk-based approach to application security can bolster your defenses

Security

Net-security

10.3.20

What is open threat intelligence and what is driving it?

Security

Net-security
10.3.20

Researchers develop data exchange approach with blockchain-based security features

Security

Net-security
10.3.20

eBook: Automating Incident Response

Security

Net-security
9.3.20

Europe’s Gaia-X cloud service faces a difficult future

Security

Net-security
9.3.20

Automate manual security, risk, and compliance processes in software development

Security

Net-security

7.3.20

Microsoft MVP Summit Now A Virtual Conf Over Coronavirus Fears Security

Bleepingcomputer

7.3.20

Chain Reactor: Simulate Adversary Behaviors on Linux

OS  Security

SANS
6.3.20 Let’s Encrypt Pushes Back Deadline to Revoke Some TLS Certificates Security

Threatpost

6.3.20

A Safe Excel Sheet Not So Safe

Security

SANS
5.3.20 Mokes and Buerak distributed under the guise of security certificates Security Securelist
5.3.20

Most enterprises choose multi-cloud strategies, 55% plan to invest in data virtualization

Security

Net-security
5.3.20

Guide: 10 critical issues to cover in your vendor security questionnaires

Security

Net-security
4.3.20 Have I Been Pwned No Longer For Sale Security

Threatpost

4.3.20

How adaptive trust makes security efficient

Security

Net-security

4.3.20

Social engineering: Mind the identity verification gap

Security

Net-security
3.3.20 Super Tuesday Marks First Major Security Test of 2020 Security Securityweek
3.3.20

Soon, your password will expire permanently

Security

Net-security

3.3.20

Security operations and the evolving landscape of threat intelligence

Security

Net-security

3.3.20

Researchers use ultrasound waves vibrating through tables to access cellphones

Security

Net-security
3.3.20

Download guide: Advanced Threat Protection Beyond the AV

Security

Net-security

2.3.20

5 considerations for building a zero trust IT environment

Security

Net-security

2.3.20

Exploring the impact that hybrid cloud is having on enterprise security and IT teams

Security

Net-security
1.3.20 Chrome and Firefox Extension Lets You View Deleted Web Pages Security

Bleepingcomputer

1.3.20

Hiding Windows File Extensions is a Security Risk, Enable Now Security

Bleepingcomputer

1.3.20 Credit Card Skimmer Uses Fake CDNs To Evade Detection Security

Bleepingcomputer

1.3.20

Brave Browser Integrates Wayback Machine to View Deleted Web Pages Security

Bleepingcomputer

1.3.20

Hazelcast IMDG Discover Scan

Security

SANS
1.3.20

Crooks are attempting to take over tens of thousands of WordPress sites

Security

Securityaffairs

29.2.20

uBlock Origin 1.25 Now Blocks Cloaked First-Party Scripts, Firefox Only Security

Bleepingcomputer

29.2.20

Mozilla Enables DNS-over-HTTPS by Default for All USA Users Security

Bleepingcomputer

29.2.20

Google Brings Its Lighthouse Pagespeed Extension to Firefox Security

Bleepingcomputer

28.2.20

Show me Your Clipboard Data!

Security

SANS

27.2.20

Framework Isolates Libraries in Firefox to Improve Security Security Securityweek

27.2.20

Online 'Impersonator' Tried to Contact Campaigns, DNC Says Security Securityweek

27.2.20

Hacker Earns $8,500 for Vulnerability in HackerOne Platform Security Securityweek

27.2.20

Offensive Tools Are For Blue Teams Too

Security

SANS

27.2.20

McAfee Buys Browser Isolation Firm Light Point Security Security Securityweek

27.2.20

A new way for securing web browsers from hackers

Security

Net-security

27.2.20

One in five SMBs use no endpoint security at all

Security

Net-security

27.2.20

What is driving the machine identity crisis?

Security

Net-security

26.2.20

Intel Announces New Hardware-based Security Capabilities Security Securityweek

25.2.20

European Commission has chosen the Signal app to secure its communications Security Securityaffairs

25.2.20

HackerOne Surpasses $82 Million in Paid Bounties Security Securityweek

25.2.20

Infoblox announces enterprise best practices for DoT/DoH

Security

Net-security

25.2.20

BEC Group Abuses Google G Suite in Scheme Targeting Thousands of Firms Security Securityweek

25.2.20

Researchers trick autonomous car autopilot with phantom images

Security

Net-security

25.2.20

Review: Specops Key Recovery

Security

Net-security

25.2.20

Mismanagement of Device Identities Could Cost Businesses Billions: Report

Security

Securityweek

25.2.20

Cisco Unveils SecureX Security Platform

Security

Securityweek

25.2.20

Cybersecurity hiring challenges and retention issues demand new talent pipelines

Security

Net-security

25.2.20

Cloud-based collaboration tools are a major driver of data exfiltration

Security

Net-security

25.2.20

The importance of risk reduction for robotic process automation

Security

Net-security

25.2.20

eSentire Annual Threat Intelligence Report: 2019 Perspectives and 2020 Predictions

Security

Net-security

24.2.20

Changing the mindset of the CISO: From enforcer to enabler

Security

Net-security

24.2.20

Organizations lack confidence in their network security

Security

Net-security

24.2.20

97% of IT leaders worried about insider data breaches

Security

Net-security

24.2.20

Download: The Ultimate Security Pros’ Checklist

Security

Net-security

23.2.20

Google Tells Microsoft Edge Users To Get Chrome for Better Security Security

Bleepingcomputer

23.2.20

Tesla Pays $10K for Microsoft SQL Server Reporting Services Bug Security

Bleepingcomputer

21.2.20

Looking at the future of identity access management (IAM)

Security

Net-security

21.2.20 Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform Security Securityweek
21.2.20 Cometdocs Threatens Legal Action Over Disclosure of Security Issues Security Securityweek
21.2.20

Whodat? Enumerating Who "owns" a Workstation for IR

Security

SANS

21.2.20

Cloud-enabled threats are on the rise, sensitive data is moving between cloud apps

Security

Net-security

21.2.20

Worldwide ICT spending forecast to reach $4.3 trillion in 2020

Security

Net-security

20.2.20

What is flowing through your enterprise network?

Security

Net-security

20.2.20

Are CISOs ready for zero trust architectures?

Security

Net-security

20.2.20

Cloud misconfigurations surge, organizations need continuous controls

Security

Net-security

19.2.20

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure Security Securityaffairs
19.2.20 Google Brings Titan Security Keys to More Countries Security Securityweek
19.2.20

The top four Office 365 security pain points

Security

Net-security
18.2.20

Microsoft Trials Election Security Solution in Wisconsin

Security

Securityweek
18.2.20 Google Axes 500 Chrome Extensions Exfiltrating User Data Security Securityweek
18.2.20

IT and business process automation growing with cloud architectures

Security

Net-security

17.2.20 Launching the First “Yomi Hunting” Challenge! Security Securityaffairs
17.2.20

SecOps teams face challenges in understanding how security tools work

Security

Net-security

17.2.20

Researchers design a tool to identify the source of errors caused by software update

Security

Net-security
17.2.20

Key technology trends that will redefine businesses over the next three years

Security

Net-security

17.2.20

SOAR or not to SOAR?

Security

SANS
15.2.20 Google Removes Dashlane Password Manager from Chrome Web Store Security

Bleepingcomputer

15.2.20

StockX Adds 2-Step Verification for Better Security, Enable Now Security

Bleepingcomputer

15.2.20

News Wrap: Valentine’s Day Scams and Emotet’s Wi-Fi Hack

Security

Threatpost

14.2.20 Microsoft Brings Safe Documents, Application Guard to More 365 ProPlus Users Security Securityweek

14.2.20

Keep an Eye on Command-Line Browsers

Security

SANS
14.2.20

43% of IT professionals are still tracking assets in spreadsheets

Security

Net-security

14.2.20

Digital certificates still cause unplanned downtime and application outages

Security

Net-security
14.2.20

Global spending on smart cities initiatives to total nearly $124 billion in 2020

Security

Net-security

13.2.20

Security pros anticipate automation will reduce IT security headcount, but not replace human expertise

Security

Net-security

13.2.20

A closer look at the global threat landscape

Security

Net-security

13.2.20

Employees aware of privacy risks, but unsure of how they affect the workplace

Security

Net-security

13.2.20

Crucial trends shaping the managed services market

Security

Net-security

13.2.20

Download: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification

Security

Net-security

12.2.20

Credential exposure report: Poor password habits still pose a serious threat

Security

Net-security

12.2.20

Download: IR Management and Reporting PowerPoint template

Security

Net-security

12.2.20

MorganFranklin names Jason Berland as Managing Director of its IAM service offering

Security

Net-security

11.2.20

Cybersecurity is a board level issue: 3 CISOs tell why

Security

Net-security

11.2.20

Organizations struggling to find skilled security staff, leaving 82% of security teams understaffed

Security

Net-security

11.2.20

eBook: 8 Real World Use Cases for SOAR

Security

Net-security

10.2.20

The future of DNS security: From extremes to a new equilibrium

Security

Net-security

10.2.20

Study: The Blind Spots of Email Security

Security

Net-security

8.2.20 Office 365 to Block Harmful Content Regardless of Custom Configs Security

Bleepingcomputer

8.2.20 Google Chrome To Bar HTTP File Downloads Security

Threatpost

8.2.20 Wacom Tablet Data Exfiltration Raises Security Concerns Security

Threatpost

8.2.20 Chrome Will Block Insecure Downloads on HTTPS Pages Security Securityweek
7.2.20 Charming Kitten Uses Fake Interview Requests to Target Public Figures Security

Threatpost

7.2.20 Dropbox Passes $1M Milestone for Bug-Bounty Payouts Security

Threatpost

7.2.20

Discrepancies between data sanitization policy creation and execution put data at risk

Security

Net-security

6.2.20

Chrome 80 Released With 56 Security Fixes

Security  Vulnerebility

Securityweek

6.2.20

Google Shared Private Videos With Wrong Users

Security

Securityweek

6.2.20

Fake browser update pages are "still a thing"

Security

SANS

5.2.20 Microsoft detects 77,000 active web shells on a daily basis Security Securityaffairs
5.2.20 Dropbox paid more than $1 Million via its bug bounty program Security Securityaffairs
5.2.20 Irish Regulator Probes Google, Tinder Over Data Processing Security Securityweek
5.2.20 Dropbox Paid Out Over $1 Million Through Bug Bounty Program Security Securityweek
5.2.20

HECVAT toolkit helps higher education institutions assess cloud adoption risk

Security

Net-security

5.2.20

Lack of .GOV validation and HTTPS leaves states susceptible to voter disinformation campaigns

Security

Net-security

4.2.20

State-sponsored actors may have abused Twitter API to de-anonymize users

Security

Net-security

4.2.20

Tesla Autopilot Duped By ‘Phantom’ Images

Security

Threatpost

4.2.20

Automation is advancing faster than the enterprise knowledge required to support it

Security

Net-security
3.2.20

Interconnectivity and networking predictions for 2020 and beyond

Security

Net-security

3.2.20

Do your employees feel valued? 64% have one foot out the door

Security

Net-security
3.2.20

Now available: eSentire’s 2019 Annual Threat Intelligence Report

Security Net-security
2.2.20 Microsoft Launches Xbox Bounty Program With $20K Maximum Payout Security

Bleepingcomputer

2.2.20 Google Chrome Tests Replacing URLs With Search Queries in Address Bar Security

Bleepingcomputer

2.2.20 Google Pays $6.5 Million to Hackers for Reporting Security Bugs Security

Bleepingcomputer

1.2.20 Google Rolls Back Change Making Search Results Look Like Ads Security

Bleepingcomputer

1.2.20

Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program

Security

Threatpost

1.2.20

Zero Day Initiative Bug Hunters Rake in $1.5M in 2019

Security

Threatpost

31.1.20

Google Open Sources Code for Security Key Devices Security Securityweek

31.1.20

Make your own security key with Google’s OpenSK

Security

Net-security

31.1.20

Microsoft invites gamers and researchers to new Xbox bug bounty program

Security

Net-security

31.1.20

New Project Informs Security Teams of Phished Users Security Securityweek

31.1.20

House Committee Passes Bills Improving CISA Leadership and Authority Security Securityweek

30.1.20

AI-based Document Classification Firm Concentric Emerges From Stealth Security Securityweek

30.1.20

Google Sets Record High in Bug-Bounty Payouts

Security

Threatpost

30.1.20

Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats

Security

Threatpost

30.1.20

How to prioritize IT security projects

Security

Net-security

30.1.20

Organizational culture defines a successful cloud strategy

Security

Net-security

30.1.20

How industries are evolving their DevOps and security practices

Security

Net-security

30.1.20

Tech pros should consider modern APM tools to gain insight across the entire application stack

Security

Net-security

29.1.20

Google Paid Out $6.5 Million Through Bug Bounty Programs in 2019

Security

Securityweek
29.1.20

Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more!

Security

Net-security

29.1.20

2020: A year of deepfakes and deep deception

Security

Net-security

29.1.20

50% of people would exercise at least one right under the CCPA

Security

Net-security
28.1.20

How to detect and prevent issues with vulnerable LoRaWAN networks

Security

Net-security

28.1.20

Security risks for e-scooters and riders exposed

Security

Net-security

28.1.20

Benefits of blockchain pilot programs for risk management planning

Security

Net-security

27.1.20

Is Threat Hunting the new Fad?

Security

SANS

26.1.20 Sonos Backtracks: Legacy Devices Will Get Updates After May Security

Bleepingcomputer

26.1.20

LastPass Mistakenly Removes Extension from Chrome Store, Causes Outage Security Bleepingcomputer
26.1.20 ProtonVPN Apps Open Sourced for Added Transparency and Security Security

Bleepingcomputer

26.1.20

Visibility Gap of Your Security Tools

Security

SANS

25.1.20 Microsoft Releases Azure Security Benchmark Security Securityweek
23.1.20 Data Security Startup Privafy Emerges From Stealth Mode Security Securityweek
23.1.20

Zero Trust: Beyond access controls

Security

Net-security

23.1.20

There is no easy fix to AI privacy problems

Security

Net-security

23.1.20

CIOs using AI to bridge gap between IT resources and cloud complexity

Security

Net-security

22.1.20

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

Security

Securityweek
22.1.20

Source Code Released for All ProtonVPN Apps

Security

Securityweek
21.1.20 Realistic Factory Honeypot Shows Threats Faced by Industrial Organizations Security Securityweek
21.1.20

Researchers create OT honeypot, attract exploits and fraud

Security

Net-security

21.1.20

DeepBlueCLI: Powershell Threat Hunting

Security

SANS

21.1.20

Data-driven vehicles: The next security challenge

Security

Net-security

21.1.20

Review: Enzoic for Active Directory

Security

Net-security

21.1.20

Techniques and strategies to overcome Kubernetes security challenges

Security

Net-security

21.1.20

Revenue from cloud IT infrastructure products declines

Security

Net-security

20.1.20

Business units and IT teams can no longer function in silos

Security

Net-security
19.1.20 Google to Kill Chrome Apps Across All Platforms Security

Bleepingcomputer

19.1.20

Google Chrome Aims to Make Browser User-Agents Obsolete Security

Bleepingcomputer

18.1.20

Microsoft Introduces Free Source Code Analyzer Security Securityweek

18.1.20

Data Security Startup Cyral Emerges From Stealth Mode Security Securityweek

18.1.20

News Wrap: PoC Exploits, Cable Haunt and Joker Malware Security

Threatpost

18.1.20

Hack the Army bug bounty program paid $275,000 in rewards Security Securityaffairs
17.1.20 Expert: Georgia Election Server Showed Signs of Tampering Security Securityweek
17.1.20 Siemens Warns of Security Risks Associated With Use of ActiveX Security Securityweek

17.1.20

Microsoft Application Inspector: Check open source components for unwanted features

Security

Net-security

17.1.20 Cloudflare Announces Free Security Services for Political Campaigns Security Securityweek
17.1.20

White Ops appoints Rhushabh ‘Rush’ Mehta as Sr. VP of Engineering

Security

Net-security
16.1.20 A Practical Guide to Zero-Trust Security Security

Threatpost

16.1.20 Public Bug Bounty Program Launched for Kubernetes Security Securityweek
16.1.20 Google Simplifies Enrollment Process for Advanced Protection Program Security Securityweek
16.1.20

Embedding security, the right way

Security

Net-security

16.1.20

Six trends attracting the attention of enterprise technology leaders

Security

Net-security
16.1.20

Global security services industry to experience spend growth of more than $80 billion

Security

Net-security
15.1.20

Kubernetes bug bounty program open to anyone, rewards up to $10,000

Security

Net-security

15.1.20

Public Bug Bounty Takes Aim at Kubernetes Container Project Security

Threatpost

14.1.20

Security pitfalls to avoid when programming using an API

Security

Net-security

13.1.20

A case for establishing a common weakness enumeration for hardware security

Security

Net-security

13.1.20

Transact with trust: Improving efficiencies and securing data with APIs

Security

Net-security

12.1.20 Microsoft Enables Security Defaults in Azure Active Directory Security

Bleepingcomputer

10.1.20

More Data Exfiltration

Security

SANS

10.1.20

What students think about university data security

Security

Net-security

9.1.20

eBook: How Hackers Plan Their Attacks

Security

Net-security

8.1.20

Smart cities are on the rise, what are the dangers?

Security

Net-security
7.1.20 Mimecast Acquires Threat Protection Provider Segasec Security Securityweek
7.1.20 Microsoft Access Files Could Include Unintentionally Saved Sensitive Data Security Securityweek
7.1.20 Are Overlapping Security Tools Adversely Impacting Your Security Posture? Security Securityweek
6.1.20

Increase in Number of Sources January 3rd and 4th: spoofed

Security

SANS
6.1.20

Modern security product certification best practices

Security

Net-security
5.1.20 BusKill, a $20 USB Dead Man’s Switch for Linux Laptop Security Securityaffairs
4.1.20

Google Boots Security Camera Maker From Nest Hub After Private Images Go Public

Privacy  Security

Threatpost

1.1.20

"Nim httpclient/1.0.4"

Security

SANS

1.1.20

7 Tips for Maximizing Your SOC

Security

Threatpost

1.1.20

Starbucks Devs Leave API Key in GitHub Public Repo

Security

Bleepingcomputer