Threats and Breaches

Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.

Interpol Operation Synergia ransomware phishing

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’

Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed "Operation Serengeti" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 ...
Security Boulevard
supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers

Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two ...
Security Boulevard
Affect of SEO Poisoning in Organizations and How to Prevent It?

Affect of SEO Poisoning in Organizations and How to Prevent It?

In today’s digital world, online visibility is crucial for business success. SEO Poisoning has emerged as a harmful attack method in the hands of threat actors. It exploits the very system designed ...
RF Fortune Telling: Frequency Hopping Predictability

RF Fortune Telling: Frequency Hopping Predictability

| | Vulnerability Research
In the world of wireless communications, security vulnerabilities in implemented protocols canremain hidden behind layers of complexity. What appears secure due to the intricate nature ofRF communications may harbor fundamental weaknesses. Let’s ...

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running ...
landscape, threat, securing the SMB

In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity

| | c-suite, CISO, Cybersecurity, NIST
Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape ...
Security Boulevard

Stay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals

‘Tis the week of Black Friday deals, where the excitement of snagging those incredible deals can sometimes overshadow the importance of staying safe online. With cybercriminals on the prowl, it’s crucial to ...
China, threats, scams, CISA TP-Link Volt Typhoon Salt Typhoon

The Cyberthreats from China are Ongoing: U.S. Officials

U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves ...
Security Boulevard
Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy

Deepfake Fraud, Data Brokers Tracking Military Personnel

In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...