Category: Security Boulevard

Retro Tech Community & Badge Life LIVE

Creators, Authors and Presenters: d3dbot, psyop, grrrizzzz Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the…

Back to School Means Back to Breaches

Cybercriminals are increasingly targeting schools and universities. Learn how students, parents, and educators can strengthen cybersecurity defenses. The post Back to School Means Back to Breaches appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Microsoft DCU’s Takedown of RaccoonO365

 When I saw the name of the Microsoft Digital Crime Unit’s latest target, “RaccoonO365” I probably reacted to it differently than most.  With the help of a friend in Lagos, we’ve been watching the money launderers and things have reached…

Anton’s Security Blog Quarterly Q3 2025

Amazingly, Medium has fixed the stats so my blog / podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast…

Technical Analysis of Zloader Updates

IntroductionZloader (a.k.a. Terdot, DELoader, or Silent Night) is a Zeus-based modular trojan that emerged in 2015. Zloader was originally designed to facilitate banking, but has since been repurposed for initial access, providing an entry point into corporate environments for the…

6 Ways CISOs Are Using AI to Prioritize Critical Vulnerabilities

Just like AI is transforming business operations, it’s revolutionizing how CISOs handle vulnerabilities. AI-powered vulnerability prioritization helps reduce alert noise, focus on high-risk issues, and automate remediation, enabling security teams to act faster, stay ahead of threats, and strengthen their…

Budget-Friendly Secrets Management Strategies

Why Are Non-Human Identities Critical for Budget-Friendly Security? How can organizations maintain a fortified security posture while staying within budget constraints? This challenge is particularly pressing when considering the management of Non-Human Identities (NHIs), which play a pivotal role in…

DEF CON 33: Mobile Hacking Community

Creators, Authors and Presenters: d3dbot, Mobile Hacking Community Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference’s events located at the Las Vegas Convention Center; and via…

Feel Reassured with Comprehensive Secrets Scanning

Are You Leveraging Non-Human Identities for Optimal Security? The increasing prevalence of Non-Human Identities (NHIs) presents both opportunities and challenges for cybersecurity professionals. These machine identities are critical components of modern security systems, but managing them effectively requires a strategic…