Threats & Breaches

Here’s Yet Another D-Link RCE That Won’t be Fixed
Richi Jennings | | D-Link, D-Link Corporation, D-Link vulnerability, D-Link zero day, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iot, SB Blogwatch
D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ...
Security Boulevard

Protecting Critical Infrastructure with Zero-Trust and Microsegmentation
Ransomware attacks are increasingly targeting critical infrastructure — essential systems like energy, water, transportation and finance. In 2023 alone, over 40% of attacks hit these sectors, according to the FBI. Meanwhile, agencies ...
Security Boulevard

Microsoft Veeps Ignite Fire Under CrowdStrike
Richi Jennings | | CrowdStrike, CrowdStrike Falcon, CrowdStrike incident;, crowdstrike updates, David Weston, ignite, Microsoft, Microsoft security, Microsoft Virus Initiative, Microsoft Windows, Quick Machine Recovery, rust, Safe Deployment Practices, SB Blogwatch, Windows, Windows security
BSODs begone! Redmond business leaders line up to say what’s new in Windows security ...
Security Boulevard

EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems
Jeffrey Burt | | cyber attack on critical infrastructure, EPA, public water systems, Vulnerabilities
The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had "critical" or "high-risk" security flaws and another 211 had less dangerous vulnerabilities, risking threats from ...
Security Boulevard

7 Common Web App Security Vulnerabilities Explained
Web applications have increasingly become the backbone of many businesses, but also, unfortunately, major targets for cyberthreats ...
Security Boulevard
Enzoic Acquires VeriClouds
Enzoic | | account takeover, credential screening, Cybersecurity, Data breaches, Enzoic News, Password Security
VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand ...

Ransomware Evolution: From Triple-Quadruple Extortion to RaaS
In 1989, the first ransomware attack was recorded. It was the foundational ground that laid the wave of digital invasions that the world has been witnessing with an attack occuring every two ...

Barracuda Networks Report Sees Sextortion Becoming More Personalized
A report published by Barracuda Networks warns that sextortion attacks are getting even more personal and payment demands have increased ...
Security Boulevard
E-commerce Fraud Prevention: Securing Your Business and Trust
Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers ...

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...