ransomware data breach MOVEit

SEC is Investigating Progress Software in Wake of MOVEit Attacks

Progress Software is now adding an investigation by the U.S. Securities and Exchange Commission to its growing list of legal and financial headaches stemming from the massive hack of its MOVEit file ...
Security Boulevard
Best Practices for Cloud Application Security Testing

Best Practices for Cloud Application Security Testing

Ensuring robust cloud application security within a cloud environment is a vital component of any cloud ecosystem. It empowers businesses to enhance their agility while mitigating potential security risks. Essential cloud application ...
API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

Why Are APIs so Easy for Threat Actors to Exploit?

Lax API security creates the perfect window of opportunity, often with a low barrier to entry. Cybercriminals are eager to exploit it ...
Security Boulevard
threats, attacks, generative AI ChatGPT phishing

AI More Helpful Than Harmful in Cybersecurity

The majority of of IT security managers see the use of AI in security tools as helpful rather than a threat they must defend against ...
Security Boulevard
Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with ...
Data Doesn’t Deceive: Cyber Attacks and it’s Reality Check

Data Doesn’t Deceive: Cyber Attacks and it’s Reality Check

Cyber Attacks are an ongoing indicator that the internet has two sides as we explore digital platforms. On every click and keystroke, there can be both a source of convenience and a ...
Microsoft AI, LLMs, GPT OpenSSF AI ML Darktrace Concentric supply chain Palo Alto AI partnership ai

Microsoft AI Researchers Exposed 38TB Private Info

The rush to embrace AI has increased the potential for security problems. Microsoft is just the latest example ...
Security Boulevard
Akamai cybersecurity, defense, organization, Vulcan supply chain SMB Cowbell Cyber cyberattack colonial ransomware insurance attacks access

Enhancing Cyberdefense for Your Business: Where to Begin

SMEs must seek cyberdefense guidance from cybersecurity professionals with the necessary expertise ...
Security Boulevard
The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1

The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1

In this episode Ryan Davis, Chief Information Security Officer at NS1, speaks with host Tom Eston about the changing role of the CISO, acquisitions, what the biggest challenges are, and Ryan’s advice ...
ransomware data breach MOVEit

Attackers Target Crypto Companies in Retool Data Breach

| | Data breach, deepfake, google, MFA, Phishing
A data breach late last month of software development platform firm Retool led to the accelerated acquisition of one of its users and put a spotlight on an account synchronization feature that ...
Security Boulevard