Hacker leaks millions of genetic data profiles

A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany on a hacking forum. Earlier this month, a threat actor leaked the stolen data of 1 million Ashkenazi Jews who used 23andMe services to find their ancestry info and genetic predispositions. 23andMe told BleepingComputer* that … More Hacker leaks millions of genetic data profiles

Strengthening the weakest link: top 3 security awareness topics for your employees

Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats. It’s Cybersecurity Awareness Month (CSAM) time again this October. This is an awareness-raising initiative that spans both consumer and corporate worlds, although there’s plenty of crossover: every employee is also a consumer, after all. In fact, … More Strengthening the weakest link: top 3 security awareness topics for your employees

Better safe than sorry: 10 tips to build an effective business backup strategy

How backup best practices can help drive resilience and improve cyber-hygiene in your company Could your company survive if its most critical data stores were suddenly encrypted or wiped out by cybercriminals? This is the worst-case scenario many organizations have been plunged into as a result of ransomware. But there are also many other scenarios … More Better safe than sorry: 10 tips to build an effective business backup strategy

WhatsApp turns on passwordless logins for Android users

WhatsApp users on Android can say goodbye to insecure and annoying SMS two-factor authentication, writes The Verge*. The Meta-owned company announced on X (formerly Twitter) that it’s rolling out support for a passwordless passkey feature to all Android users. The new security option allows WhatsApp users to use their device’s face, fingerprint, or pin security … More WhatsApp turns on passwordless logins for Android users

Staying on top of security updates

Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises. This week, the US Cybersecurity and Infrastructure Security Agency (CISA) added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, citing solid evidence of active exploitation by attackers. The vulnerabilities, for … More Staying on top of security updates