Dracula Phishing Platform Targets Organizations Worldwide

In light of recent cyber threats, the Dracula phishing platform has prevailed, targeting organizations in over 100 countries. The Dracula phishing attacks are centered on leveraging an immense network of over 20,000 ...

LockBit Ransomware Bounty: US Offers $15 Million In Reward

In a landscape where cyber threats loom large, the hunt for cybercriminals intensifies. Today, we’re turning the spotlight on LockBit ransomware attacks and the unprecedented $15 million bounty offered by the U.S ...
panasonic nvidia ransomware XDR ransom ProxyLogon Black Kingdom Egregor

Report: Average Initial Ransomware Demand in 2023 Reached $600K

An Arctic Wolf report found the median initial ransom demand made by cybercriminals rose 20% year-over-year to $600,000 ...
Security Boulevard

Protecting Against Apache ActiveMQ Vulnerability

In the world of cybersecurity, new threats emerge constantly, and it’s vital for organizations to stay vigilant. Recently, a critical vulnerability, known as CVE-2023-46604, has been making headlines due to its exploitation ...
Halloween cybercriminals

Spookiest Hacks, Cybercriminals and Tactics Lurking in 2023

A Bitdefender study found nearly half of Halloween-themed spam is fraudulent, with 69% of the spam hitting U.S. inboxes ...
Security Boulevard

FBI Alert: Dual Ransomware Attack Surge

In recent times, cybersecurity threats and dual ransomware incidents have evolved, affecting organizations worldwide. The Federal Bureau of Investigation (FBI) has issued a warning about a troubling trend pertaining to dual ransomware ...
Future-Proofing Your Career: Navigating AI in the Workplace | Is Your Job at Risk?

Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge

In this episode, we explore the growing trend of AI surveillance in corporations, where cutting-edge technology is used to monitor employees, optimize productivity, and raise ethical concerns. Next, we uncover a disturbing ...
generative AI voice cloning

Cloud Threats Rise: Who’s Attacking and How They Get In

Knowing who the threat actors are, how they are getting into your cloud environment and where your vulnerabilities are is a starting point to improving cloud security ...
Security Boulevard
SlashNext vm2 sandbox bucket travel

SlashNext Report Shines Light on Scope of Airbnb Fraud

SlashNext found cybercriminals using infostealers and stolen browser cookies to set up fraudulent websites offering 50% discounts on Airbnb bookings ...
Security Boulevard
HR, cyberthreat, landscape, insider threats, HP Wolf TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

HP Report Details Tactics Used to Evade Detection Tools

HP Wolf Security report showed how tactics and techniques cybercriminals use to evade detection are evolving ...
Security Boulevard