An emerging ransomware group that calls itself Bert is quickly evolving after hitting the cybercrime scene in April, targeting both Windows and Linux systems used by organizations in the health care, tech, and other industries in the United States, Europe,…
Category: Security Boulevard
Chinese Hacker Linked to Silk Typhoon Charged With Stealing COVID Data
A 33-year-old Chinese national linked to the Silk Typhoon espionage group was arrested in Italy on a U.S. warrant that accuses him of conspiring with others in hacks of U.S. COVID-19 vaccine researchers and exploiting flaws in Microsoft Exchange Server…
23andMe…and Everyone Else: All Eyes are on the Most Personal Data
As tempting as it is to find out if you descended from some grand poobah in Scandinavia or if your real great (x10) grandmother was Catherine the Great, the implications of a fine recently levied against 23andMe might coax you…
A Practical Guide to Building a Red Teaming Strategy for AI
Start your red teaming journey with intent, not ambition. Designate a lead with both AI literacy and a security mindset. The post A Practical Guide to Building a Red Teaming Strategy for AI appeared first on Security Boulevard. This article…
API Sprawl Can Trip Up Your Security, Big Time
The future of API security is not just about better firewalls — it is about smarter governance, automation and visibility at scale. The post API Sprawl Can Trip Up Your Security, Big Time appeared first on Security Boulevard. This article…
Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots
When you design agentic AI with governance at the core, you stay ahead of risk and avoid reactive fire drills. The post Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots appeared first on Security Boulevard. This…
How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage
Businesses must take the threat of identity-based attacks seriously and adapt their cybersecurity practices to address this challenge. The post How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage appeared first on Security Boulevard. This article…
Guiding Global Teams: Fostering Compliance and Creativity
With empowered advocates and continuous measurement, teams can navigate the fine line between compliance, rule adherence and creative freedom. The post Guiding Global Teams: Fostering Compliance and Creativity appeared first on Security Boulevard. This article has been indexed from Security…
U.S. Target North Korean IT Worker Scams with Raids, Indictments
The DOJ announced a far-reaching operation that aimed to knock out a substantial number of North Korean IT worker scams that have victimized more than 100 U.S. companies that unwittingly hired North Korean operatives as remote workers, who then stole…
Ghost in the Machine: A Spy’s Digital Lifeline
We are pleased to feature a guest post from Jaime Halscott, Senior Technology Evangelist at IGEL. With a unique background that blends deep technical expertise, C-level experience, and a law degree, Jaime plays a key role in IGEL’s global alliances,…
Europe’s EUVD could shake up the vulnerability database ecosystem
The post Europe’s EUVD could shake up the vulnerability database ecosystem appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Europe’s EUVD could shake up the vulnerability database ecosystem
DOJ Charges 324 in Sprawling $14.6 Billion Health Care Fraud Scams
The DOJ and other U.S. agencies has charged 324 people, including medical professionals and pharmacists, in connection with a series of investigations into health care fraud, with one investigation dubbed Operation Gold Rush involving $10.6 billion in fraud, the largest…
DOJ Charges 324 in Sprawling $14.6 Billion Healthcare Fraud Scams
The DOJ and other U.S. agencies has charged 324 people, including medical professionals and pharmacists, in connection with a series of investigations into health care fraud, with one investigation dubbed Operation Gold Rush involving $10.6 billion in fraud, the largest…
How OTP Works (Step-by-Step) — What Really Happens Behind Those One-Time Codes
Introduction You’ve probably seen those little one-time codes pop up when you’re logging into your bank, email, or some app […] The post How OTP Works (Step-by-Step) — What Really Happens Behind Those One-Time Codes appeared first on Security Boulevard.…
Etsy Stops Unwanted Traffic & Reduces Computing Costs with DataDome & Google
Discover how Etsy reduced bot traffic, cut computing costs, and protected user experience by integrating DataDome’s AI-powered bot protection with Google Cloud. A smart move for scale and savings. The post Etsy Stops Unwanted Traffic & Reduces Computing Costs with…
Our pentest quote form saves you time
We are pleased to announce the release of our new penetration testing quote form, which is optimised to save you time. There is no need for a lengthy scoping call, or a long-winded series of technical questions. No excel scoping…
AI Is Enhancing The Traditional Pentesting Approach – A Detailed Analysis
For a long time now, traditional pentesting has served as the backbone of proactive cyberdefense strategies across all industries flourishing in the digital realm. Pacing with the time where technology is making history- speed, accuracy, and foresight are paramount when…
News alert: SquareX research finds browser AI agents are proving riskier than human employees
Palo Alto, Calif., Jun. 30, 2025, CyberNewswire–Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case. SquareX’s research reveals that Browser AI Agents are more likely to fall prey ……
LinuxFest Northwest: See How Far COSMIC Has Come This Year
Authors/Presenters: Carl Richell (CEO And Founder, System76) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events located…
Best Software Composition Analysis (SCA) Tools: Top 6 Solutions in 2025
What you need to know about SCA tools Quick Answer: The top SCA tools in 2025 are Mend.io (best for automated remediation and proactive SCA), Sonatype Lifecycle (known for enterprise policy management), Snyk (known for developer experience), and Checkmarx SCA…