Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25

Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25

Insight No. 1: You should be staging cyberattacks Cyberattacks are becoming more frequent and sophisticated, posing a significant threat to businesses of all sizes.Crisis simulations — one of which is now included ...
spyware NSO pegasus Ransomware

Apple Warns of Further Compromises by Israel’s NSO Group

The NSO Group, known for their suite of exploitation tools, has once again found itself at the center of unwanted attention when Apple revealed that it had warned a number of individuals, ...
Security Boulevard
HUMAN, bot, Fortinet, NDR, AI agents, HPE, NDR, Androxgh0st macOS malware cracked software trojan

Bad Apples: How CNA Attacks Put Everyone At Risk

On September 14, 2021, two unrelated incidents demonstrated not only the vulnerability of users to state-sponsored attacks but the fact that defenders are relegated to playing “cat and mouse” with attackers (including ...
Security Boulevard
Secret Govt. Spy Powers Coming Here—via Australia

Secret Govt. Spy Powers Coming Here—via Australia

The Australian government has given itself an enormous surveillance tool. Five Eyes means that rules in Oz can be used here, too ...
Security Boulevard
situational, awareness, Wyze connected camera

AI Surveillance in a Post-Pandemic World

Artificial intelligence (AI) has made waves across industries including automotive, health care, entertainment, finance, manufacturing, and more, while still a nascent technology. Another area where it made a significant impact is law ...
Security Boulevard
FBI Wants to Invest in Social Media Surveillance Tool

FBI Wants to Invest in Social Media Surveillance Tool

Terrorist organizations know their way around the web, and they don’t shy away from using social networks to communicate with each other or to recruit new members. The FBI is looking into ...
Cyberattack Compromises US Customs and Border Protection Photo Database

Cyberattack Compromises US Customs and Border Protection Photo Database

Photos of people crossing the US border, taken over a month and a half, including images of their faces and vehicle numbers, were compromised in a malware attack on a subcontractor working ...
China forces spyware onto Muslim’s Android phones, complete with security holes

China forces spyware onto Muslim’s Android phones, complete with security holes

If you’re a member of the Uyghur Muslim population in Xinjiang, you’re probably used to China’s high level of surveillance that many other countries would find Orwellian. Whereas many of us are ...