The Data Privacy Revolution

In an era where data breaches, ransomware, and other cyber threats are becoming increasingly sophisticated, traditional methods of protecting data, PII, and other sensitive details are proving inadequate. Decades ago, neither HTTP ...
pinocchio puppet

Emerald Divide Uses GenAI to Exploit Social, Political Divisions in Israel Using Disinformation

Bad actors are always ready to exploit political strife to their own ends. Right now, they’re doing so with the conflict in the Middle East. A holistic defense against influence networks requires ...
Security Boulevard
airsoft players.

Airsoft Data Breach Exposes Data of 75,000 Players

Failure to configure authentication allowed malicious actors to exploit Airsoftc3.com's database, exposing the sensitive data of a vast number of the gaming site's users ...
Security Boulevard
data, privacy, databases, AWS, UnitedHealth ransomware health care UnitedHealth CISO

UnitedHealth: Ransomware Attackers Stole Huge Amount of Data

The health insurance giant also admitted that it paid a ransom to the threat group as its CEO prepares to testify before Congress May 1 ...
Security Boulevard

Linux Backdoor Infection Scare, Massive Social Security Number Heist

In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...
Mr. Cooper Hackers Stole ~15 Million Users’ Data

Mr. Cooper Hackers Stole ~15 Million Users’ Data

Another day, another huge leak: In October, they called it an “outage;” last month, it became a “cybersecurity incident;” now it’s a full-on PII leak ...
Security Boulevard

Preventing PII Leakage through Text Generation AI Systems

Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into ...