Tuesday, June 3, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Europe

vulnerability, ENISA, database,

EU Stakes Out Digital Sovereignty With Vulnerability Database 

Teri Robinson | May 19, 2025 | cisa, Cybersecurity, ENISA, Europe, EUVD, MITRE, vulnerability database
Depending on who’s doing the talking, the new European Vulnerability Database (EUVD), set up by the European Union Agency for Cybersecurity (ENISA) and which recently went operational, is a much-needed alternative to ...
Security Boulevard
DORA table DMARC

Where DORA and DMARC Meet

John Bowers | July 3, 2024 | #banks, dmarc, DMARC benefits, Ecosystem News, Email Security Insights, Europe
In this article we describe how the Digital Operational Resilience Act intersects with DMARC and how DMARC can complement DORA's objective of making the financial sector more digitally secure and resilient ...
DMARC Archives - dmarcian
“Oh, won’t somebody please think of the children?”

EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped

Richi Jennings | June 20, 2024 | Chat Control, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, CSAM, CSEM, E2EE, encryption, end-to-end encryption, eu, Europe, European Compliance, european election, European Governments, European legislation, European Union, European Union (EU), SB Blogwatch, signal, WhatsApp, Won’t somebody think of the children?
Ongoing European Union quest to break end-to-end encryption (E2EE) mysteriously disappears ...
Security Boulevard

LogRhythm’s RhythmWorld Europe Cybersecurity Summit Returns to Share Strategies for Cyber Resilience and Mitigating Future Threats

Julie Thomson | April 16, 2024 | Europe, Event, General, RhythmWorldEurope, UKI
The free-to-register event brings together cybersecurity leaders to discuss navigating ransomware, the cybersecurity talent gap, advantages of automation and more LogRhythm, the company helping security teams stop breaches by turning disconnected data and ...
LogRhythm

MoqHao Evolution Poses Immense Threat to Android Users

Wajahat Raja | February 20, 2024 | android malware, asia, BleepingComputer, Cyber Threats, Cybersecurity, Cybersecurity experts, Cybersecurity News, Data Leaks, Europe, mcafee, MoqHao Evolution, Permissions, Phishing, phishing messages, proactive cybersecurity measures, Roaming Mantis, smishing, Unicode strings, XLoader
Cybersecurity threat experts have recently discovered a new variant of the malware named XLoader, commonly known as MoqHao, that has the ability to automatically infect devices without any user interaction. Being termed ...
TuxCare
Biden data brokers

Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List

Richi Jennings | July 19, 2023 | android spyware, Biden administration, Commerce Department, Cytrox, Department of Commerce, Entity List, eu, Europe, European Union, European Union (EU), Intellexa, iOS spyware, Malware Spyware, Predator spyware, SB Blogwatch, spyware
European cousins Intellexa and Cytrox essentially banned by Commerce Dept. — Predator/ALIEN not welcome in U.S ...
Security Boulevard
Woman talking on the phone

GDPR FAIL: US Firm ‘Profiles Half the World’ — it’s Max Schrems Again

Richi Jennings | June 26, 2023 | Belgium, BICS, Data Privacy, EEA, eu, EU GDPR, EU Privacy Shield, EU-US Privacy Shield, Europe, Europe Regulation, European Compliance, European Court of Human Rights, European Digital Rights, European Union, European Union (EU), GDPR, GDPR compliance, gdpr eu, GDPR fine, GDPR violations, Privacy, Privacy Shield, Proximus, risk scoring, safe harbor, SB Blogwatch, Schrems, Schrems II, Scoring, social credit scores, TeleSign, Trans-Atlantic Data Privacy Framework
NYOB accuses TeleSign, Proximus and BICS of misusing phone users’ private data. Reputation scoring = privacy violation? ...
Security Boulevard
Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight

Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight

Richi Jennings | May 22, 2023 | Data Privacy, EEA, eu, EU GDPR, EU Privacy Shield, EU-US Privacy Shield, Europe, Europe Regulation, European Compliance, European Court of Human Rights, European Digital Rights, European Union, European Union (EU), facebook, Facebook data, facebook fine, GDPR, GDPR compliance, gdpr eu, GDPR fine, GDPR violations, Meta, Privacy, Privacy Shield, safe harbor, Schrems, Schrems II, Trans-Atlantic Data Privacy Framework
GDPR Move for Mark’s Money: No legal way to move Europeans’ data to the US since 2015. Cloud industry better take note ...
Security Boulevard
Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms

Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms

Cybereason Nocturnus | October 6, 2021 | Advanced persistent threat, Aerospace, Agrius APT, APT, Critical Infrastructure, cyberattack, Espionage, Europe, Iran, MalKamak, Malop, Malware, Nation-state Attack, national security, Nocturnus, Operation GhostShell, remote-access Trojan, research, ResearchCat, Russia, ShellClient RAT, telecommunications, telecoms, threat actors, Threat Intelligence, Turla, United States
In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional ...
Blog

From a Submarine to Cybersecurity: Tripwire Expands in Continental Europe

Joe Pettit | July 15, 2021 | Cybersecurity, Europe, tripwire, Tripwire News
In the last few years, Tripwire has increased its portfolio to include industries that were previously overlooked in the cybersecurity space. Industrial organizations are the newest targets for some of the most malicious ...
The State of Security
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Security Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Microsoft Opens Windows Update to 3rd-Party Apps
SentinelOne Outage Leaves Security Teams Hanging for Six Hours
Zscaler Moves to Acquire Red Canary MDR Service
Microsoft Authenticator Phases Out Password Features and Apple Watch Support
Cybersecurity Alert: Major Breaches at TikTok and Ticketmaster
What Is MCP? The New Protocol Reshaping AI Agent Security
CISA’s New SOAR Guidance Shows Where Automation Must Go Next
19 Billion Passwords Leaked: Protect Yourself from Cyber Threats

Industry Spotlight

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | 3 days ago 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | 4 days ago 0
Microsoft Opens Windows Update to 3rd-Party Apps
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Microsoft Opens Windows Update to 3rd-Party Apps

May 29, 2025 Richi Jennings | 4 days ago 0

Top Stories

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Mobile Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks

June 2, 2025 Jeffrey Burt | Yesterday 0
U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups

June 2, 2025 Jeffrey Burt | Yesterday 0
Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps
AI and Machine Learning in Security AI and ML in Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps

June 2, 2025 Michael Vizard | Yesterday 0

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×