FTC Rejects Request for New COPPA Application

FTC Rejects Request for New COPPA Application

The Federal Trade Commission (FTC) has declined an application “without prejudice” by the Entertainment Software Rating Board, Yoti, and SuperAwesome for FTC approval of a new method for obtaining parental consent under the Children’s Online Privacy Protection Rule (COPPA Rule). The applicants in 2023 sought approval for the use of “Privacy-Protective Facial Age Estimation” technology, […]

Global Influence Changing in a Year of Elections – The Shift in Power

The influence of individual countries has evolved drastically due to the rapid advancements in digital technologies. Geographical constraints are no longer the sole determinants of power. In this episode, experts discuss how modern forces are reshaping global spheres of influence and impacting elections in major powers around the world. Chinese and Russian pragmatism is challenging […]

Florida Pediatric Associates experiences health data breach

Florida Pediatric Associates (FPA) has disclosed that a data breach at Bowden Barlow Law may have impacted FPA health information. Fortunately, FPA’s systems were not affected as the breach was contained within Bowden Barlow’s environment. On December 27, 2023, Bowden Barlow notified FPA of a potential data security incident, indicating that certain patient data from […]

Leveraging One-Day Vulnerabilities: The Magnet Goblin Group

Recent research has shown that Magnet Goblin, a financially motivated threat actor group, exploits one-day vulnerabilities as a preliminary infection vector. The group predominantly targets public-facing servers and deploys Nerbian malware, such as NerbianRAT and MiniNerbian. Previous activities carried out by the threat actor group were detailed by security vendors, although at that point, none […]

Secure Software Development Attestation Form released by CISA

The CISA has released a form that outlines the basic requirements for secure software development for organizations that create software for the government. The attestation specifies additional security measures that software providers must adhere to during the development process. This is crucial to ensure that the software used by the government is developed in a […]

March Madness Can Be Used by Cybercriminals as a Ploy for Attacks

Malicious actors often exploit major events to target the general public. Events that attract a large audience can be used as a platform to distribute malicious emails, links, and other forms of communication. As March Madness approaches, security leaders advise organizations to educate their employees about the potential risks associated with phishing campaigns and scams. […]

67% of businesses transfer passwords from on-premises to cloud environments

New research by Silverfort has uncovered that a majority of businesses synchronize on-premises passwords with cloud environments, compromising the security of the cloud setup. This migration of on-premises vulnerabilities to the cloud environment creates a loophole that malicious actors can exploit. As organizations increasingly transition to cloud environments over the past decade, many have failed […]

A recent discovery: A new, advanced phishing platform as a service

According to researchers at Netcraft, a new phishing-as-a-service platform called darcula has been discovered. This platform, operating on over 20,000 phishing domains, provides cybercriminals with access to phishing templates and simplifies the deployment of phishing sites. Unlike other similar platforms, darcula has the ability to update in place, allowing for the incorporation of new features […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.