Monday, June 23, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

extortion

world map

Nigeria, Romania, Russia, U.S. Among Top Cybercrime Nations

Nathan Eddy | April 24, 2024 | attacks, brazil, cashing out, china, data theft, extortion, Identity Theft, money laundering, nigeria, research, romania, Russia, Scams
Russia and Ukraine topped a list of cybercrime-producing nations, followed by China and the United States, with African nation Nigeria rounding out the top five ...
Security Boulevard
disney, code, data, API security ransomware extortion shift

Most Ransom Groups Now Using Extortion, Delinea Survey Finds

Jeffrey Burt | January 30, 2024 | Delinea, extortion, Ransomware, ransomware payments
The ransomware landscape continues to evolve, with attackers now more likely to exfiltrate data and threaten victims with selling or leaking the sensitive information on the dark web rather than encrypting the ...
Security Boulevard

Microsoft Storm-1152 Crackdown: Stopping Threat Actors

Wajahat Raja | December 29, 2023 | Arkose Labs, CaaS, CAPTCHA, collaboration, cyber threat response, cybercrime, Cybersecurity, cybersecurity community, Cybersecurity News, Duong Dinh Tu, extortion, hacking group, industry experts, Information Sharing, Kevin Gosschalk, law enforcement collaboration, legal actions, Linh Van Nguyễn, MGM Resorts, Microsoft, Okta, Ontinue, outlook, Ransomware, scattered spider, Storm-1152, Tai Van Nguyen, Vigilance
In a significant stride against cybercrime, Microsoft has declared victory in dismantling cybercrime operations of Storm-1152. This group, a major player in the cybercrime-as-a-service (CaaS) ecosystem, was involved in selling access to ...
TuxCare
DORA, regulatory, LockBit ransomware DOJ reward

RansomedVC Ransomware Group is Shutting Down and Selling Assets

Jeffrey Burt | November 14, 2023 | Colonial Pipeline, Cybersecurity, extortion, ranomsware
RansomedVC, the ransomware-as-a-service (RaaS) group that cut a high-profile but short-lived swath through the cybercrime scene over the past three months, is shutting down operations and selling off its infrastructure. The threat ...
Security Boulevard
disaster, recovery, ransomware RansomHub LockBit BlackCat/ALPHV

Monti Returns From 2-Month Break with Revamped Ransomware Variant

Jeffrey Burt | August 14, 2023 | Conti, Cybersecurity, extortion, Linux, Ransomware
The Monti ransomware group that emerged in June 2022 used source code, tools, and tactics – not to mention an almost identical name – of the notorious Conti gang as it targeted ...
Security Boulevard
ransomware GAO cyberinsurance Sonrai

Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies

Mark Rasch | April 3, 2023 | cyberinsurance, Cyberlaw, encryption, extortion, Malware, Ransomware
The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering ...
Security Boulevard
Boost Your Privacy: 3 New and Effective Ways to Stop Online Tracking!

Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company

Tom Eston | February 20, 2023 | china, cryptocurrency, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, extortion, felony, google, Information Security, Infosec, location tracking, Phishing, Podcast, Podcasts, Privacy, reddit, security, Spy Balloon, technology, UAP, Ubiquiti, UFO, Weekly Edition
Reddit announced that it was the victim of a phishing attack aimed at its employees, resulting in unauthorized access to internal documents, code, and some unspecified business systems. Advice on managing device ...
The Shared Security Show

Hackers Using Fake Police Data Requests against Tech Companies

Bruce Schneier | April 5, 2022 | courts, extortion, forgery, Hacking, police, Scams, Uncategorized
Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies serving large numbers of users online have ...
Schneier on Security
All About LAPSUS$: What We Know About the Extortionist Group

All About LAPSUS$: What We Know About the Extortionist Group

Jonathan Zalman | March 23, 2022 | Blog, cyber extortion, cybercrime, extortion, Threat Intelligence
LAPSUS$ is an extortionist threat group that became active on December 10, 2021. Unlike the majority of extortionist groups that typically rely on a combination of ransomware and data leaks, LAPSUS$ is ...
Blog – Flashpoint
Planned Parenthood Ransomware Attack Has Far Reaching Implications

Planned Parenthood Ransomware Attack Has Far Reaching Implications

Ken Westin | December 2, 2021 | cyberattack, Cybereason Anti-Ransomware Solution, Cybereason Predictive Ransomware Protection, Data breaches, extortion, personally identifiable information, PHI, pii, Planned Parenthood, RansomOps, Ransomware
The Planned Parenthood Los Angeles affiliate announced that their computer network was hit by a ransomware attack. The compromise occurred between October 9 and 17 and affected around 400,000 patients’ data ...
Blog
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road
AWS Extends Scope of Cybersecurity Alliance with CrowdStrike
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance
Your passwords are everywhere: What the massive 16 billion login leak means for you
Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security
The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive
AI Security Guide: Protecting models, data, and systems from emerging threats

Industry Spotlight

Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | Yesterday 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | 2 days ago 0
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Blockchain Cloud Security Cybersecurity Data Security Digital Currency Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

June 18, 2025 Jeffrey Burt | 4 days ago 0

Top Stories

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

June 22, 2025 Jeffrey Burt | Yesterday 0
AWS Raises Expertise Bar for MSSP Partners
AI and Machine Learning in Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AWS Raises Expertise Bar for MSSP Partners

June 22, 2025 Michael Vizard | Yesterday 0
Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
Cybersecurity Featured News Security Boulevard (Original) Social - X Spotlight 

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

June 19, 2025 Jon Swartz | 3 days ago 0

Download Free eBook

The State of Cloud Native Security 2020

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×