Friday, June 20, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

infostealer

Lumma, infostealer RATs Reliaquest

Law Enforcement, Microsoft Disrupt Operations of Popular Lumma Stealer

Jeffrey Burt | May 22, 2025 | Cyber Attacks Microsoft, ESET, infostealer, Lumma Stealer, Ransomware
International law enforcement agencies and cybersecurity vendors seized thousands of domains used to run the MaaS operations of the widely popular Lumma Stealer malware, which was used to facilitate ransomware, malvertising, and ...
Security Boulevard
DEF CON 32 - Sneaky Extensions  The MV3 Escape Artists - Vivek Ramachandran, Shourya Pratap Singh

Browser Extensions: The Infostealers Nobody is Watching Out For

SquareX | January 20, 2025 | browser extension, Browsers, Cybersecurity, Data Loss Prevention, infostealer
Extension-Based Infostealers and How to Stop ThemInfostealers have become a critical security threat, capable of exfiltrating valuable data including credentials, intellectual property, personal information, and financial records. Currently, two primary categories are well-documented: ...
SquareX Labs - Medium
Lumma, infostealer RATs Reliaquest

Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign

Jeffrey Burt | July 17, 2024 | infostealer, Internet Explorer, Microsoft, Windows vulnerability
The APT group Void Banshee exploited a now-patched Windows security flaw and the retired Internet Explorer browser to distributed the Atlantida malware to steal system information and sensitive data from victims ...
Security Boulevard
Snowflake CISO Brad Jones

Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked

Richi Jennings | June 11, 2024 | 2 factor auth, 2-factor authentication, 2fa, Advance  Auto  Parts, Brad Jones, Breach Forums, BreachForums, Buying event tickets online and cybersecurity, Cloud MFA, Data leak, DUAL FACTOR AUTHENTICATION, Event ticketing industry, infostealer, infostealers, LendingTree, Mandiant, Mandiant report, MFA, mult-factor authentication, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, NYSE:SNOW, Privacy, QuoteWizard, Ransomware, SB Blogwatch, ShinyHunters, snowflake, Taylor Swift, threats, Ticketmaster, two factor authentication, UNC5537
Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts ...
Security Boulevard

TA547 Phishing Attack: German Companies Hit With Infostealer

Wajahat Raja | April 22, 2024 | AIChatbot, AIinCybersecurity, ChatGPT, CyberAttackEvolution, cyberespionage, Cybersecurity News, CybersecurityThreat, FinancialMotivation, GermanCompanies, infostealer, LNKFiles, PhishingAttack, PowerShellScript, Rhadamanthys, TA547
Researchers at Proofpoint have found out that the TA547 phishing attack campaigns have been targeting different German companies. Identified as TA547, the threat actor has been using an information stealer called Rhadamanthys ...
TuxCare
Troy Hunt, the culprit behind HaveIBeenPwned.com

Massive ‘New’ Leaked Credentials List: Naz.API Pwns Troy

Richi Jennings | January 18, 2024 | authentication credentials, Compromised Credential, compromised credentials, compromised credentials monitoring, credential, Credential Compromise, credential database, Credential Dumping, credential harvesting, credential hijacking, credential loss, Credential Monitoring, credential stealing, credential stuffing, credential stuffing attack, Credential Stuffing Attacks, credentialstuffing, haveibeenpwned, HaveIBeenPwned.com, HIBPwned, info stealer, information stealer, infostealer, infostealers, malicious apps that steal passwords, Naz.API, password stuffing, SB Blogwatch, stuffingattacks, Troy Hunt
Have I been pwned? Yes, you probably have. Stop reusing passwords, already. Here’s what else you should do ...
Security Boulevard
A still from the 1928 animated short, “Steamboat Willie”—the first appearance of Mickey Mouse

Google Whistles While OAuth Burns — ‘MultiLogin’ 0-Day is 70+ Days Old

Richi Jennings | January 2, 2024 | access-token-manipulation, authentication token, Business Associate Agreements, Chrome, chrome 0-day, chrome phishing, Chrome Security, Chromium, Chromium-Based Browsers, Federated Identity, federated sso, google, Google Account, google account security, Google Advanced Protection, infostealer, infostealers, OAuth, oauth 2.0, oauth abuse, Oauth Application Abuse, oauth refresh token, OAuth Token Vunerability, Prisma, Protecting OAuth Tokens, SB Blogwatch, securing oauth
What a Mickey Mouse operation: Infostealer scrotes having a field day with unpatched vulnerability ...
Security Boulevard
authentication, SMS, buddy system, credential stuffing attack

Concerns About Infostealer Malware on the Rise

Michael Vizard | July 12, 2023 | Authentication, credentials, identity and access, infostealer, Malware, SpyCloud
A SpyCloud report found more than half of respondents are extremely concerned about their ability to thwart attacks that exfiltrate authentication data ...
Security Boulevard
Lumma, infostealer RATs Reliaquest

Infostealer Malware Threat Grows as MFA Fatigue Attacks Spread 

Nathan Eddy | December 22, 2022 | Accenture, infostealer, Malware, MFA, mfa fatigue
Information stealer malware flourished on underground criminal networks in 2022, along with a rise in multifactor authentication (MFA) fatigue attacks, according to research from Accenture’s Cyber Threat Intelligence team. Infostealers are malicious software ...
Security Boulevard
Digital artists targeted in RedLine infostealer campaign

Digital artists targeted in RedLine infostealer campaign

Bart | June 14, 2021 | Crypto, infostealer, nft, redline
2021-06-17: updated with information from Twitter user ARC In this post, we'll look at a campaign, that targeted multiple 3D or digital artists using NFT, with malware named RedLine. This malware is ...
Blaze's Security Blog
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran Nuclear Sites 
Novel TokenBreak Attack Method Can Bypass LLM Security Features
Washington Post Journalists’ Microsoft Email Accounts Hacked
Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road
U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam
Guardrails Breached: The New Reality of GenAI-Driven Attacks
Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
EU AI ACT
MY TAKE: Microsoft takes ownership of AI risk — Google, Meta, Amazon, OpenAI look the other way
Introducing Guernsey Cyber Security Centre

Industry Spotlight

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Blockchain Cloud Security Cybersecurity Data Security Digital Currency Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

June 18, 2025 Jeffrey Burt | 1 day ago 0
Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road

June 18, 2025 Richi Jennings | 1 day ago 0
Novel TokenBreak Attack Method Can Bypass LLM Security Features
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Vulnerabilities 

Novel TokenBreak Attack Method Can Bypass LLM Security Features

June 17, 2025 Jeffrey Burt | 2 days ago 0

Top Stories

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
Cybersecurity Featured News Security Boulevard (Original) Social - X Spotlight 

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

June 19, 2025 Jon Swartz | Yesterday 0
AWS Makes Bevy of Updates to Simplify Cloud Security
Cloud Security Cybersecurity Featured News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AWS Makes Bevy of Updates to Simplify Cloud Security

June 18, 2025 Michael Vizard | 1 day ago 0
U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam

June 17, 2025 Jeffrey Burt | 2 days ago 0

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×