GDPR Privacy

Selfie scraping Clearview AI €20 Million fine in Greece

The Hellenic data protection authority has fined the controversial facial recognition firm Clearview AI with €20 million and banned it from collecting and processing the personal data of people living in Greece. Also already collected data should be deleted. The business model of Clearview AI is scraping selfies off the internet to build an algorithmic […]

Uncategorized Multifactor Authentication Password Management Phishing

Microsoft: Phishing bypassed MFA in attacks against 10,000 orgs

Microsoft phishing attacks have targeted more than 10,000 organizations starting with September 2021, using the gained access to victims’ mailboxes in follow-on business email compromise (BEC) attacks.The threat actors used landing pages designed to hijack the Office 365 authentication process (even on accounts protected by multifactor authentication (MFA) by spoofing the Office online authentication page.In […]

Multifactor Authentication Phishing

Microsoft: Phishing bypassed MFA in attacks against 10,000 organizations

Microsoft phishing attacks have targeted more than 10,000 organizations starting with September 2021, using the gained access to victims’ mailboxes in follow-on business email compromise (BEC) attacks.The threat actors used landing pages designed to hijack the Office 365 authentication process (even on accounts protected by multifactor authentication (MFA) by spoofing the Office online authentication page.In […]

Data Breaches Privacy

Windows 10 location data data breach

The processing of location data is unnecessary, such as Windows 10’s location setting being automatically enabled violates the “data protection by default” requirement under Article 25(2) GDPR. The DPA noted that the principle of “data protection by default” requires that the controller, when using third-party software or firmware, ensures that functions for which there is […]

Security

Top 25 Most Dangerous Software Weaknesses

The 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software Weaknesses list demonstrates the currently most common and impactful software weaknesses. Often easy to find and exploit, these can lead to exploitable vulnerabilities that allow adversaries to completely take over a system, steal data, or prevent applications from working.