cybersecurity

Two of America's most impactful cybersecurity incidents (Change Healthcare and Colonial Pipeline) began with attackers exploiting leaked credentials for VPNs with no MFA.
“We are pretty tightly aligned with the MongoDB product team. That allowed us to scale up and attack use cases where we're scanning petabytes of data, and solving really hard problems for customers.”

Prosecution follows allegations of extensive pwnage, desperately poor hygiene, and as CISO falls on his sword.

It takes a special kind of stupid to export a LastPass vault and dump it into a public bucket along with a bunch of AWS keys. How do these people win critical government contracts again, please?

Group screwed up their opsec, let Trend Micro pull samples, configuration files, and log files from attackers' servers.