Security Awareness

The Invisible Data Battle: How AI Became a Cybersec Professional’s Biggest Friend and Foe
It comes as no surprise that as the incidence of cybercrime increases, cybersec teams are becoming faster at detecting threats. ...
Security Boulevard

DeepSeek Breach Yet Again Sheds Light on Dangers of AI
AI isn’t waiting for security teams to catch up. It’s running full steam ahead, without any regard for what may stand in its way. The recent security debacle surrounding DeepSeek — where ...
Security Boulevard

Corporate Layoffs Put Company IP at Risk
Todd Thorsen | | cloud file storage, Cybersecurity, Data loss, file backup, Intellectual Property, security
With corporate layoffs and government workforce reductions frequently making headlines, leaders often underestimate the potential for massive data loss and intellectual property liability ...
Security Boulevard

Hunters International Dumps Ransomware, Goes Full-on Extortion
Hunters International, the RaaS group that some believe evolved from Hive, appears to be rebranding and shifting operations, moving away from an unprofitable and risky ransomware business and focusing solely on exfiltrating ...
Security Boulevard

When AI Agents Start Whispering: The Double-Edged Sword of Autonomous Agent Communication
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | agentic, agents, AI (Artificial Intelligence), architecture, Artificial Intelligence, Awareness, data protection, security
AI agents develop their own communication channels beyond our monitoring frameworks, we face a pivotal challenge: harnessing their collaborative problem-solving potential while preventing security breaches and compliance violations that could arise when ...

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat
CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has ...
Security Boulevard

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Defense in Depth is Broken – It’s Time to Rethink Cybersecurity
Breaking down why traditional defense-in-depth strategies fail and what security teams must do to truly outsmart attackers. ...
Security Boulevard

The Evolution of Smishing: 3 Ways to Detect and Prevent Attacks
Smishing has evolved dramatically in recent years, with increased attack frequency and a much higher quality of the fraudulent landing pages. ...
Security Boulevard

Online Scams in the Age of AI
Yoav Keren | | AI-powered fraud, cybersecurity threats, Deepfakes and synthetic media, Digital trust and brand protection, Phishing and impersonation scams
The question is no longer whether AI-driven scams will target your business, but how prepared you are to counter them ...
Security Boulevard