Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed "Operation Serengeti" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 ...
Security Boulevard

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two ...
Security Boulevard

QNAP’s Buggy Security Fix Causes Chaos
Richi Jennings | | automatic updates, data storage, firmware, firmware patch, firmware security, firmware update, Firmware Updates, hard disk drive, hard drive, NAS, os security updates, QNAP, QTS, RAID, Release Management, SB Blogwatch, security update, storage
RAID FAIL: NAS Maker does a CrowdStrike—cleanup on /dev/dsk/c1t2d3s4 please ...
Security Boulevard

Affect of SEO Poisoning in Organizations and How to Prevent It?
In today’s digital world, online visibility is crucial for business success. SEO Poisoning has emerged as a harmful attack method in the hands of threat actors. It exploits the very system designed ...

RF Fortune Telling: Frequency Hopping Predictability
In the world of wireless communications, security vulnerabilities in implemented protocols canremain hidden behind layers of complexity. What appears secure due to the intricate nature ofRF communications may harbor fundamental weaknesses. Let’s ...
Privileged Account Security in Active Directory
Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running ...

In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity
Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape ...
Security Boulevard
Stay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals
‘Tis the week of Black Friday deals, where the excitement of snagging those incredible deals can sometimes overshadow the importance of staying safe online. With cybercriminals on the prowl, it’s crucial to ...

The Cyberthreats from China are Ongoing: U.S. Officials
U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves ...
Security Boulevard

Deepfake Fraud, Data Brokers Tracking Military Personnel
Tom Eston | | biometrics, Cyber Security, cyber threat, Cybersecurity, Data Brokers, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Fraud, Germany, Information Security, Infosec, Location, location data, military, pirates, Podcast, Podcasts, Privacy, Privateers, Scams, security, Strava, surveillance, technology, Weekly Edition
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...