Lazarus Hacker Group Actively Exploiting Windows Kernel Flaw

The cybersecurity world is abuzz with the revelation of Lazarus Group’s exploitation of a critical vulnerability in Windows Kernel. The Windows Kernel flaw, targeting CVE-2024-21338, has raised concerns due to its potential ...

APT29 Espionage Attacks: Microsoft Issues Urgent Warning

In a recent announcement, Microsoft issued a warning regarding the increasing activities of APT29, a Russian state-sponsored cyber threat group. This group, notorious for its involvement in espionage attacks on Microsoft‘s systems ...

LinkedIn Smartlinks Attacks Target Microsoft Accounts

In the ever-evolving landscape of cybersecurity threats, hackers have once again employed a cunning strategy by exploiting LinkedIn’s Smart Links in phishing attacks, aiming to steal Microsoft account credentials. These sophisticated LinkedIn ...
Cybersecurity Awareness Month: The Evolution of Ransomware

Cybersecurity Awareness Month: The Evolution of Ransomware

This Cybersecurity Awareness Month, join GuidePoint Security for A Voyage Beyond the Horizon, a speculative exploration of possible scenarios that […] ...
Guardians of the Cyber Realm: Unveiling Excalibur’s Arsenal in the Battle for Digital Security!

Guardians of the Cyber Realm: Unveiling Excalibur’s Arsenal in the Battle for Digital Security!

In today’s blog post we again embark on a thrilling journey through the intricate landscapes of cybersecurity! With Excalibur as your guide, delve into the vulnerabilities of passwords, meet the valiant guardians ...
Detecting a Phishing Email: 10 Things to Watch

Detecting a Phishing Email: 10 Things to Watch

As security professionals, we remain vigilant in identifying phishing attempts and actively seek information on defending against ransomware and phishing attacks. These topics hold paramount importance within the security community. It is ...
threat simulation exercises

The Human Factor in Threat Simulation: Testing Employee Awareness and Training Effectiveness

As businesses increasingly rely on technology to store and manage sensitive information, the risks associated with cyber attacks continue to rise. While many companies invest in top-of-the-line security software and hardware, the ...
What can you do with an SBOM today?

What can you do with an SBOM today?

Software Bill Of Materials BlueprintWe can all agree that computer software is a complicated construct composed of numerous diverse components. Open-source software is becoming ever more common as a building block in ...
An image illustrating defending a Ci/Cd pipeline

From Vulnerability to Victory: Defending Your CI/CD Pipeline

Automated CI/CD (Continuous Integration/Continuous Delivery) pipelines are used to speed up development. It is awesome to have triggers or scheduling that take your code, merge it, build it, test it, and ship ...
Cisco resignation distributed workspaces

Countering Insider Threats as the Great Resignation Continues

According to Fortune Magazine, 40% of U.S. employees are considering an exit from their current place of business. This trend, which has been termed The Great Resignation, creates instability within organizations. High ...
Security Boulevard