Cloud File-Sharing Platforms Targeted for Corporate Data Theft
Threat actors are actively targeting cloud file-sharing platforms such as ShareFile, Nextcloud, and OwnCloud, exploiting these services to steal corporate data and then offer it for sale. These attacks demonstrate how collaboration infrastructure — trusted by organisations — can become a lucrative target for data theft. This trend underscores the need for strong identity, access […]
Crunchbase Data Breach: ShinyHunters Claims Over 2 Million Records Stolen
The cybercrime group ShinyHunters claims it accessed and leaked more than 2 million records belonging to Crunchbase after failed extortion, with the company confirming unauthorized data exfiltration from its corporate network. Reports suggest exposed information includes personal and corporate data, raising serious identity and security concerns. Strong identity protection and proactive IAM strategies are vital […]
CIRO Data Breach Affecting 750,000 Investors Highlights Deepening Identity Risk
The Canadian Investment Regulatory Organization (CIRO) has confirmed that a cybersecurity incident exposed personal information belonging to about 750,000 Canadian investors — including sensitive details such as social insurance numbers, investment account numbers, and contact information. While there is currently no evidence of misuse of the information, the scale of the breach underscores the growing […]
Cyberattacks on Dating Platforms Highlight the Growing Identity Risk in Consumer Digital Ecosystems
Recent cyberattacks impacting Bumble in the U.S., along with effects on Crunchbase and Match Group, highlight a growing shift in cyber risk — from infrastructure to identity-driven attack surfaces. As digital platforms become more interconnected and data-centric, identity, access, and user trust layers are increasingly being targeted. Strong IAM is no longer just about access […]
What Okta’s Data Residency Expansion Means for Indian Enterprises
The adoption of digital technologies and AI is accelerating rapidly across India’s enterprise landscape. However, this shift brings a set of challenges around data protection, regulatory compliance, and identity governance — particularly in sectors where compliance and risk management are paramount. Table of Content Introduction Meeting Regulatory and Compliance Needs Enabling Secure Adoption of AI […]
Redefining Digital Trust in the Age of AI-Driven Fraud
The cybersecurity landscape is undergoing a fundamental transformation. AI is no longer just an innovation driver — it has become a powerful tool for cybercriminals. Attackers now use AI to mimic human behavior, generate synthetic identities, and automate social engineering attacks, making traditional security controls increasingly ineffective. Table of Content Introduction Why Continuous Trust Is […]