Tuesday, June 10, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

rat

Who's to Blame for Hacked Social Media Accounts?

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

Tom Eston | March 11, 2024 | account hacking, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, google, hacked, Hacking, Information Security, Infosec, Instagram, Malware, Meeting Invite, Meta, Microsoft Teams, online, Podcast, Podcasts, Privacy, rat, RATs, remote-access Trojan, security, social media, Spoofed Online Meetings, spoofing, Teams, technology, Weekly Edition, Zoom
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Shared Security Podcast
cybersecurity malware

By Following the Crypto, Cyfirma Identifies Developer Behind CraxsRAT

Jeffrey Burt | August 21, 2023 | android, cryptocurrency, Cybersecurity, Malware, rat
The person responsible for developing the dangerous CraxsRAT malware that targets Android devices has been operating in Syria for more than eight years and has accumulated at least $75,000 over the last ...
Security Boulevard
RAT Borat Trojan Kazakhstan

Borat RAT: Funny Name, Serious Threat

Teri Robinson | April 11, 2022 | Borat, Malware, Ransomware, rat, remote-access Trojan
It may be named after a popular, irreverent mockumentary, but the new Borat remote access trojan (RAT), a malware strain recently spotted in the wild, is a serious threat to organizations. The ...
Security Boulevard
Corelight Sensors detect the ChaChi RAT

Corelight Sensors detect the ChaChi RAT

Corelight Labs Team | June 24, 2021 | blackberry, C2, ChaChi, Command And Control, Corelight Labs, dns, pcap, rat, remote-access Trojan, SERVFAIL, Vern Paxson, Wireshark
By Paul Dokas, Keith Jones, Anthony Kasza, Yacin Nadji, & Vern Paxson – Corelight Labs Team Recently Blackberry analyzed a new GoLang Remote Access Trojan (RAT) named “ChaChi.” This sample was interesting ...
Bright Ideas Blog
New COVID-19-themed Malware Campaign Spreading through Emails

New COVID-19-themed Malware Campaign Spreading through Emails

Silviu STAHIE | May 25, 2020 | COVID-19, Emails, Industry News, NetSupport, office, rat
Microsoft warns of a new COVID 19-related malware campaign spreading by email and using Excel 4.0 macros and NetSupport Manager to compromise systems. The email is a favorite method for attackers to ...
HOTforSecurity
Attack Campaign Leveraged Coronavirus Theme to Deliver Remcos RAT

Attack Campaign Leveraged Coronavirus Theme to Deliver Remcos RAT

David Bisson | February 26, 2020 | coronavirus, IT Security and Data Protection, Latest Security News, rat, Remcos
Security researchers discovered an attack campaign that abused fears surrounding the global coronavirus outbreak to deliver the Remcos RAT. Yoroi Security detected the attack campaign when its threat intelligence activities uncovered a ...
The State of Security
Imminent Monitor

Man jailed for using webcam RAT to spy on women in their bedrooms

Graham Cluley | January 9, 2020 | Featured Articles, IT Security and Data Protection, Malware, rat, webcam
A British man has been jailed for two years after police caught him using a notorious Remote Access Trojan (RAT) to hijack the webcams of young women, and spy upon them. The ...
The State of Security

Hiding in Plain Sight: New Adwind jRAT Variant Uses Normal Java Commands to Mask its Behavior

Krishnan Subramanian - Menlo Labs Researcher | October 29, 2019 | Internet Isolation, rat, Web security
Street magicians have a secret: If you want to hide something, hide it in plain sight. It’s how hidden card tricks, sleight of hand and most illusions work. Unfortunately, malicious actors are ...
Menlo Security Blog
Attackers Targeting U.S. Petroleum Companies with Adwind RAT

Attackers Targeting U.S. Petroleum Companies with Adwind RAT

David Bisson | October 2, 2019 | adwind, IT Security and Data Protection, Latest Security News, petroleum, rat
Digital criminals have launched a new attack campaign that they’re using to target U.S. petroleum companies with the Adwind RAT. Netskope discovered the operation in the beginning of September and found that ...
The State of Security
An Analysis of L0rdix RAT, Panel and Builder

An Analysis of L0rdix RAT, Panel and Builder

Alex Holland | July 19, 2019 | builder, cybercrime, l0rdix, panel, rat, remote access tool, Threat Research, trojan
L0rdix is a multipurpose remote access tool (RAT) that was first discovered being sold on underground criminal forums in November 2018. Shortly after its discovery, Ben Hunter of enSilo analysed the RAT’s ...
Bromium
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

They Deepfaked Through the Bathroom Window: How Cybercriminals Are Targeting Executives & Key Personnel at Home
BADBOX 2.0 Botnet Infects Million-Plus Devices, FBI Says
Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI
Contrast Security Combines Graph and AI Technologies to Secure Applications
No Lollygagging: Cisco IOS XE Flaw With 10.0 Rating Should be Patched Now
OffensiveCon25 – No Signal, No Security: Dynamic Baseband Vulnerability Research
Top AI-Driven Pentest Tools 2025
MCP (Model Context Protocol) and Its Critical Vulnerabilities
Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead

Industry Spotlight

Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?
Analytics & Intelligence Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?

June 10, 2025 Richi Jennings | 5 hours ago 0
Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities 

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

June 4, 2025 Richi Jennings | Jun 04 0
USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | May 30 0

Top Stories

BADBOX 2.0 Botnet Infects Million-Plus Devices, FBI Says
Application Security Cloud Security Cybersecurity Data Security Featured IoT & ICS Security Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

BADBOX 2.0 Botnet Infects Million-Plus Devices, FBI Says

June 9, 2025 Jeffrey Burt | Yesterday 0
Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI
Cloud Security Cyberlaw Cybersecurity Data Security DevOps Featured Identity & Access Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Trump EO Takes Aim at Biden, Obama Provisions for Identity, Sanctions, AI

June 9, 2025 Jeffrey Burt | Yesterday 0
RSA Extends Reach of Passwordless Management Platform
Cybersecurity Featured Identity & Access News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

RSA Extends Reach of Passwordless Management Platform

June 9, 2025 Michael Vizard | Yesterday 0

Download Free eBook

The State of Cloud Native Security 2020

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×