Security Analytics

Analytics and Intelligence

How Sonatype leads in AI component analysis for supply chain security

How Sonatype leads in AI component analysis for supply chain security

From generative AI tools to pre-trained machine learning models, AI is rapidly transforming how software is developed ...
insurers, CaaS, insurance, AI-related, security, insurance, cybersecurity, cyber insurance, cybersecurity, insurance

Scattered Spider Targets Aflac, Other Insurance Companies

The prolific Scattered Spider threat group, which recently targeted U.S. and UK retailers in a series of attacks, is now turning its attention to the insurance industry and appears to have landed ...
Security Boulevard
stolen, credentials, file data, anomaly detection, data exfiltration, threat, inside-out, breach, security strategy, data breaches, data search, Exabeam, data, data breaches, clinical trials, breach, breaches, data, residency, sovereignty, data, breaches, data breaches, NetApp data broker FTC location data

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

Cybernews researchers reported that since the beginning of the year, they've detected 30 datasets containing 16 billion stolen credentials exposed on the internet, most of which had not been previously recorded and ...
Security Boulevard
Your SOC Doesn't Need More Alerts - It Needs a Brain

Your SOC Doesn’t Need More Alerts – It Needs a Brain

The phrase “alert fatigue” has become a mainstay in cybersecurity conversations. But behind the flood of findings, alerts, vulnerabilities, and compliance gaps lies a deeper problem: the security context crisis. Security teams ...
Iran Israel cyberattack

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

The Iranian government has sharply restricted internet access in the country following almost a week of Israeli airstrikes and a cyberattacks on an Iranian bank and cryptocurrency exchange by a pro-Israeli hacker ...
Security Boulevard
North Korea cyberespionage nuclear weapons

U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam

The DOJ is moving to collect $7.74 million seized two years ago in connection with a criminal case involving an IT worker scam run by North Korean operatives. The case is one ...
Security Boulevard
Join the waitlist >>

What Is Social Engineering? A Guide for K–12 School Leaders

Understanding the Human Side of Cyberattacks—and Why Schools Need Stronger Protection Cybersecurity in schools isn’t just about firewalls and software anymore. One of the most effective—and dangerous—threats school districts face today doesn’t ...
LLMs, prompt, MCP, Cato, AI, jailbreak, cybersecurity, DeepSeek, LLM, LLMs, attacks, multi-agent, Cybersecurity, AI, security, risk, Google AI LLM vulnerability

Novel TokenBreak Attack Method Can Bypass LLM Security Features

Researchers with HiddenLayers uncovered a new vulnerability in LLMs called TokenBreak, which could enable an attacker to get around content moderation features in many models simply by adding a few characters to ...
Security Boulevard