The security breach of the popular women-only safe-dating app Tea widened over the weekend, when a second database storing 1.1 million DMs between members was compromised. News of the exposure came days after an initial investigation found that a database…
Category: Security Boulevard
Palo Alto Networks In Talks to Acquire CyberArk for $20 Billion: Report
Palo Alto Networks Inc. is in discussions to acquire CyberArk Software for more than $20 billion in one of tech’s biggest deals this year, as vendors scramble to fortify their cybersecurity defenses. Palo Alto Networks could finalize a deal for…
Mapping Mayhem: Security’s Blind Spots in Identity Security
For years, primarily driven by regulatory compliance mandates, such as the Sarbanes-Oxley Act of 2002, identity and access management has been treated as a regulatory compliance exercise, rather than the security exercise it should be — and simply checking off…
Nile Gives Your Campus Network More Than Just a Password
For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Network Access Control (NAC) to act as a guardian, checking credentials at the door. Once inside, users…
Intruder Open Sources Tool for Testing API Security
Intruder this week made available an open-source tool that scans application programming interfaces (APIs) for broken authorization vulnerabilities. The post Intruder Open Sources Tool for Testing API Security appeared first on Security Boulevard. This article has been indexed from Security…
U.S. Woman Sentenced to 8.5 Years for Role in North Korean Worker Scam
Christina Marie Chapman, an Arizona resident, was sentenced to 8.5 years in prison for her role in a wide-ranging North Korean IT worker scam that sent $17 million to the outlaw country. Chapman ran a laptop farm from her home,…
“Bleach Wasn’t Strong Enough: Clorox Sues Cognizant After Help Desk Allegedly Gave Away Passwords to Hackers”
Clorox is suing IT giant Cognizant, claiming their help desk handed over employee passwords to hackers — no phishing, no malware… just gave them away. The post “Bleach Wasn’t Strong Enough: Clorox Sues Cognizant After Help Desk Allegedly Gave Away…
Cognizant Agents Gave Hackers Passwords, Clorox Says in Lawsuit
Clorox is suing Cognizant for $380 million, saying the IT services provider’s service desk put in place to protect the multinational company from cyber risks in 2023 gave hackers password resets and other credentials when asked without verifying the identities…
The “S” in Vibe Coding Stands for Security
Vibe coding is here. And it’s not just a fad — it’s reshaping how we build, deploy and even conceive of software. But unless we hit the brakes and bake in security now, we’re setting ourselves up for another generation…
Amazon AI Privacy Panic — Bee Brings Bezos Panopticon
Amazzon Beee Buzzzz: It records everything you say (and what people around you say, too). The post Amazon AI Privacy Panic — Bee Brings Bezos Panopticon appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
New Crux Ransomware Emerges in Three Attacks This Month
A new ransomware variant dubbed “Crux” was detected by Huntress researchers in three attacks this month, with the group favoring RDP for initial access and legitimate processes to make it more difficult to detect it. The group also claims to…
BforeAI Identifies Phishing Campaign Using Same Infrastructure Across Multiple Domains
BforeAI today disclosed the discovery of a phishing campaign that is leveraging the same core infrastructure to spoof multiple domains. The post BforeAI Identifies Phishing Campaign Using Same Infrastructure Across Multiple Domains appeared first on Security Boulevard. This article has…
Is Ransomware Dying? Don’t Break Out the Champagne Just Yet
We’re seeing fewer attacks, but that doesn’t mean we’re safer. The latest data from NCC Group shows traditional ransomware is down — but threat actors are regrouping, rebranding, and rearming with AI and advanced social engineering. The post Is Ransomware…
Akamai Identifies Coyote Malware Variant Capable of Compromising Microsoft UIA Framework
Akamai researchers today disclosed they have discovered a variant of Coyote malware that extracts specific banking and cryptocurrency exchanges by compromising the UI Automation (UIA) framework developed by Microsoft. The post Akamai Identifies Coyote Malware Variant Capable of Compromising Microsoft…
Analysis Finds 131 Vulnerable Exposed Ports Per Organization
An analysis published today by ReliaQuest finds the number of exposed ports through which cybercriminals can gain access to IT environments has increased to 131 in the first half of 2025, a 27% increase. The post Analysis Finds 131 Vulnerable…
Microsoft Patches SharePoint Flaws as Hackers Rush to Exploit Them
As Microsoft puts the final patch in place, a growing number of hackers, including several China state-sponsored threat groups, are quickly pushing forward to exploit the security flaws that will allow them compromise on-premises SharePoint servers to steal data and…
Seemplicity Leverages AI to Optimize Cybersecurity Remediation Efforts
Seemplicity today added artificial intelligence (AI) capabilities to its platform for managing cybersecurity remediations that promise to make teams more efficient. The post Seemplicity Leverages AI to Optimize Cybersecurity Remediation Efforts appeared first on Security Boulevard. This article has been…
Hackers Exploiting Microsoft Flaw to Attack Governments, Businesses
Hackers are exploiting a significant Microsoft vulnerability chain that allows them gain control of on-premises SharePoint servers, steal cryptographic keys, and access Windows applications like Outlook, Teams, and OneDrive. It also gives them persistence in the systems even after reboots…
The Overlooked Risk in AI Infrastructure: Physical Security
As artificial intelligence (AI) accelerates across industries from financial modeling and autonomous vehicles to medical imaging and logistics optimization, one issue consistently flies under the radar: Physical security. The post The Overlooked Risk in AI Infrastructure: Physical Security appeared first…
Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age
With cyberthreats intensifying and regulatory bodies tightening oversight, securing revenue data in the cloud is essential. The post Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age appeared first on Security Boulevard. This article has been…