panasonic nvidia ransomware XDR ransom ProxyLogon Black Kingdom Egregor

Colonial’s Ransom Payment Indicates Severity of Threats

Last week Joseph Blount, the CEO of Colonial Pipeline, told The Wall Street Journal that he authorized the ransom payment of $4.4. million to the hackers who broke into computer systems and ...
Security Boulevard
new normal

Assessing the New Normal for Cybersecurity

As work from home continues, cyberthreats related to the new normal will remain even post-pandemic “Pandemic” was the word of the year, with runners up including quarantine, coronavirus and asymptomatic. They make ...
Security Boulevard
privacy GRU

Inside the DoJ’s GRU Indictments for Cyber Meddling

For the third time in the past two years, the United States has indicted intelligence officers associated with Russia’s Main Intelligence Directorate (GRU), the military intelligence entity of the General Staff of ...
Security Boulevard
threat intelligence

Netskope Unveils Free Real-Time Threat Intelligence Exchange

Netskope today launched a Cloud Threat Exchange portal through which it will share threat intelligence with customers and partners for free. Company CTO Krishna Narayanaswamy said the Cloud Threat Exchange will automate ...
Security Boulevard
ransomware

Why Ransomware Isn’t Going Away Anytime Soon

 2019 was an extremely successful year for ransomware, rife with attacks and many high-profile victims. Of all the cyberthreats, ransomware was proven to be the most devastating. In the UK, it was ...
Security Boulevard
Qualys

7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate their next move. When you understand an attacker’s ...
Security Boulevard
encryption

Check Point Reveals Azure Cloud Security Flaw

Check Point Software Technologies revealed today its researchers were able to exploit a flaw to take over servers in the Microsoft Azure Cloud. The flaw in the Azure App Service used to ...
Security Boulevard
privacy GRU

DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info

On Dec. 12, senators Ron Johnson (R. Wis.) and Maggie Hassan (D. N.H.) introduced legislation that would grant DHS’ Cybersecurity and Infrastructure Security Agency (CISA) the authority to issue subpoenas to force ...
Security Boulevard
cybersecurity

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Security Boulevard
zero trust

Countdown to Zero: Why Zero Trust is in the Spotlight

In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no ...
Security Boulevard