They Deepfaked Through the Bathroom Window: How Cybercriminals Are Targeting Executives & Key Personnel at Home

They Deepfaked Through the Bathroom Window: How Cybercriminals Are Targeting Executives & Key Personnel at Home

When the Beatles sang the famous lyric “She came in through the bathroom window,” they were riffing on a real event, a fan who bypassed the front door and broke into Paul ...
Security Boulevard
New Attacks Targeting the Cryptocurrency Community

Crypto Drainers are Targeting Cryptocurrency Users

 As cryptocurrency becomes more popular and the adoption rises, we see a related increase in the number of cybercrimes, fraud, and malware schemes. Criminals like to hunt and plunder where there is ...

Botnets disrupted worldwide…Operation Endgame is BACK!

Operation Endgame, “Season 2”, is officially announced as of Friday, May 23rd, 2025. International law enforcement agencies and their partners have once again joined forces to disrupt and dismantle botnet infrastructure and ...
cybersec, threats, OpenText, threat, Google, threats, critical, infrastructure, ITDR, organizations, cybersecurity posture, infrastructure, threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

The Invisible Data Battle: How AI Became a Cybersec Professional’s Biggest Friend and Foe

It comes as no surprise that as the incidence of cybercrime increases, cybersec teams are becoming faster at detecting threats.  ...
Security Boulevard
ai agents, tools, cybercrime,

The AI Alibi Defense: How General-Purpose AI Agents Obscure Criminal Liability

As these AI agents become more capable of behaving like autonomous actors — clicking, typing, downloading, exfiltrating, or engaging in arguably criminal behavior — they may also become unintended scapegoats or even ...
Security Boulevard
Advanced Malware Targets Cryptocurrency Wallets

Advanced Malware Targets Cryptocurrency Wallets

 More attacks targeting cryptocurrency users.  Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via ...
Double Edged Sword 🎯 AI Risks to Small Business

Breaking Down Risks in Cybersecurity

 Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity – A great conversation on the Cyber Crime Junkies podcast with David Mauro!  We covered so many different topics that the CISOs are ...
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...
Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins

Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...
Valentine's, cybercriminals

Cybercriminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks

As Valentine’s Day approaches, cybercriminals are ramping up their efforts to exploit consumers through romance scams, phishing campaigns and fraudulent e-commerce offers ...
Security Boulevard