Threats & Breaches

Washington Post Journalists’ Microsoft Email Accounts Hacked
The Microsoft email accounts of several Washington Post journalists whose coverage includes national security and economic policy, including China, where hacked and could give the bad actors access to the messages that ...
Security Boulevard

Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
Tom Eston | | AI and Cybersecurity, cyber attacks, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hacking Incidents, Information Security, Infosec, IoT Security, Municipal Cybersecurity, network segmentation, Phishing, Podcast, Podcasts, Power-Grid Security, Privacy, Ransomware, security, smart cities, Smart City Hacks, Smart City Infrastructure, technology, Technology Governance, Urban Technology, Vulnerabilities, Weekly Edition
Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come ...

Meta AI is a ‘Privacy Disaster’ — OK Boomer
Richi Jennings | | cybersecurity risks of generative ai, dark patterns, DeleteFacebook, facebook, Facebook Spyware, generative AI, generative ai gen ai, Generative AI risks, Generative AI Security, generative artificial intelligence, Instagram, Large Language Models (LLM), Large language models (LLMs), LLM, llm applications security, Meta, Meta AI, Meta Platforms, Privacy, SB Blogwatch, social media, social network, social networking, social networking security, Social networks, spyware
More Meta mess: Pundits accuse Zuckerberg’s latest app of having a “dark pattern,” tricking the over 50s into oversharing ...
Security Boulevard

Zero-Click Flaw in Microsoft Copilot Illustrates AI Agent, RAG Risks
Jeffrey Burt | | AI agent security, Microsoft 365, Microsoft Copilot, RAG AI, security vulnerability
Aim Security researchers found a zero-click vulnerability in Microsoft 365 Copilot that could have been exploited to have AI tools like RAG and AI agents hand over sensitive corporate data to attackers ...
Security Boulevard

Microsoft Data Loss Prevention (DLP): Tips to Protect Your Business Following the Latest Outage
Alex Tray | | Data Loss Prevention, DLP tips, Incident Response, Microsoft Office 365, microsoft outage, risk assessment, Security News
Discover the capabilities of Microsoft 365 Data Loss Prevention (DLP) and understand its limitations. Learn how to prevent unauthorized data access and sharing ...
Security Boulevard

How ADR Sees the Attacks that Other Cybersecurity Tools Miss | Application-Layer Security | Contrast Security
Contrast Marketing | | Application Detection and Response (ADR), Application Layer Attacks, Application Security, Cross-Site Scripting (XSS), Data breaches, EDR, path traversal, sql injection, unsafe deserialization, Vulnerability Exploitation, waf
If your tools can’t see what’s happening inside your apps and application programming interfaces (APIs), they can’t stop breaches. And the truth is, perimeter and endpoint tools were never designed to detect ...

AI Ready: The Complete Guide to AI-Powered Cybersecurity Training in 2025/2026
Mike Polatsek | | adaptive security training, AI cybersecurity training, ai threats, AI-enhanced attacks, AI-powered attacks, AI-ready, Automated Training, Awareness Training, CISO. security information, cyber attacks, cyber readiness, cybersecurity program, Cybersecurity Training, employee security training, Identity & Access Management, micro-learning cybersecurity, MITRE ATTACK, Phishing Attacks, phishing awareness training, Phishing Simulation, Phishing Simulation Plaform, phishing training, press, ransomware attacks, Security Awareness Program, security awareness training, Security Culture, Successful Phishing Simulation, The Complete Guide to Creating a Security Culture, The Complete Guide to Passing an ISO 27001 Audit, The Ultimate Guide to Cyber Resilience, Threat Intelligence
Introduction: The AI Cybersecurity Crisis The cybersecurity landscape has fundamentally changed. AI-powered cyberattacks are projected to surge by 50% in 2024 compared to 2021, with Gartner research showing a 63% increase since ...

Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?
Richi Jennings | | 0ktapus, amazon, attacks on online retailers, DragonForce, Muddled Libra, online retailers cyber threats, Ransomware, retail, Retail & Commerce, Retail & e-commerce, Retail and E-Commerce, Retail Cybersecurity, Retail Industry, SB Blogwatch, Scatter Swine, scattered spider, Starfraud, the Com, the Community, UNC3944, UNFI, United Natural Foods, Whole Foods
UNFInished business: We were warned this would happen. And now here we are ...
Security Boulevard

No Lollygagging: Cisco IOS XE Flaw With 10.0 Rating Should be Patched Now
Cisco IOS XE Flaw: The security experts are all in agreement that organizations should rush to fix the vulnerability. ...
Security Boulevard
CIAM Across Industries: A Journey Through Digital Identity Neighborhoods
Dev Kumar | | analysis, Authentication, B2C, Cybersecurity, Data breach, Digital Identity, Identity Verification, password manager, passwordless, SBN News, vulnerability, website
The rapid pace of technological change, evolving regulations, and shifting customer expectations require CIAM systems that can adapt and evolve over time. The organizations that build sustainable competitive advantages through CIAM are ...