vulnerability curl patch

Top 10 Open Source Software Risks of 2023

Software supply chain issues continue to be a concerning subject of late. Open source software (OSS) has many benefits, yet relying on many open source dependencies could cause security woes if it ...
Security Boulevard
phishing Telegram

LastPass Devs Were Phished for Credentials

LastPass has followed news of last month’s breach with details on a second attack in which developers were phished for their credentials. In the January incident, the password manager’s parent, GoTo, said ...
Security Boulevard
US Marshals Ransomware Hack is ‘Major Incident’

US Marshals Ransomware Hack is ‘Major Incident’

The U.S. Marshals Service (USMS) has been hacked (again). Scrotes stole sensitive stuff (supposedly) ...
Security Boulevard
brand impersonation, brand fraud, SlashNext edge Using AI and ML to Win Against Fraud

SlashNext Employs Generative AI to Combat Cybersecurity Threats

SlashNext today launched a platform that makes use of generative artificial intelligence (AI) to thwart business email compromise (BEC), supply chain attacks, executive impersonation and financial fraud. SlashNext CEO Patrick Harr said ...
Security Boulevard
AI vulnerability

CrowdStrike Report Maps Changes to Cybersecurity Landscape

A report published by CrowdStrike today highlighted how the cybersecurity threat landscape has shifted in the last year, with 71% of attacks detected not involving malware. In fact, the number of interactive ...
Security Boulevard
Attacker floods PyPI with 450+ malicious packages that drop Windows trojan via Dropbox

Attacker floods PyPI with 450+ malicious packages that drop Windows trojan via Dropbox

Sonatype has been tracking an open source malware campaign developing over the weekend in which a threat actor is infiltrating the PyPI software registry with hundreds of malicious packages. These packages are ...
‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels

‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels

Google doesn’t want you to know what your Android apps do with your data. That seems to be the conclusion from a Mozilla study into the Play Store ...
Security Boulevard
A Year of the Russia-Ukraine War: Seven Types of Cyberattacks Used Against Ukraine

A Year of the Russia-Ukraine War: Seven Types of Cyberattacks Used Against Ukraine

As EclecticIQ looks back at the year since Russia’s initial invasion of Ukraine, it is clear cyberattacks have been an important part of Russia’s arsenal. This assessment is based on the variety ...
SaaS, threats and breaches, ransomware SaaS Security

IBM Security Finds Ransomware Attacks Take Less Than Four Days

IBM Security today published a report that found ransomware attacks, on average, can now be launched and completed in less than four days, down from two months previously. On the plus side, ...
Security Boulevard
AI chatbots botnets datadome Spam Bots and Fake Accounts

How Chatbots Will Change Phishing Attacks

It was only a matter of time until threat actors turned to chatbots like ChatGPT to create phishing attacks. In fact, while it has only been a couple of months since the ...
Security Boulevard