threat hunting, security, Palo Alto Networks Hunters threat hunting

How Threat Hunting can Strengthen Your Cybersecurity Posture

Threat hunting allows organizations to delve deeper into their networks, identifying hidden threats that traditional security measures might miss ...
Security Boulevard
The classic sign: “Welcome to fabulous Las Vegas, Nevada” all lit up in neon

What Happens in Vegas: MGM Resorts ‘Ransomware’ Attack

You’re welcome to it. Not happening in Vegas: 12 hotels and casinos—nor in many more elsewhere, neither ...
Security Boulevard
A man has fallen asleep on top of his books and papers

‘BLASTPASS’ iPhone Exploit — Apple Asleep at the Switch

Zero click, zero day, zero clue: Yet another iOS zero-day lets NSO’s Pegasus “mercenary spyware” cause chaos ...
Security Boulevard
Google Android malware

Google Kills 3rd-Party Cookies — but Monopolizes AdTech

Firefox looking good right now: “Privacy Sandbox” criticized as a proprietary, hypocritical, anti-competitive, self-serving contradiction ...
Security Boulevard
A phone home screen shows Signal and Telegram app icons

BadBazaar: Chinese Spyware Shams Signal, Telegram Apps

After sneaking into Google and Samsung app stores, “GREF” APT targets Uyghurs and other PRC minorities ...
Security Boulevard
Putin caricature

Did Russia Hack Poland’s Trains? MSM Says Yes, but … Well, You Decide

Train Phreaking: It depends what you mean by “hack” (and by “Russia”) ...
Security Boulevard
identity, data, data breaches, CrowdStrike Legion malware CyberArk browser password identity credentials

What This Year’s Data Breaches Reveal About Identity

These key takeaways for end users, application developers and security practitioners can help stop identity-based breaches ...
Security Boulevard