Threats and Breaches

Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.

electric wires

Oak Ridge, McCrary Institute Establish Cybersecurity Center Focused on Electrical Grid

In addition to supporting research centers, the $12.5 million project focuses on training the next generation of cybersecurity pros to safeguard the nation's critical infrastructure.  ...
Security Boulevard
Is Your Password Strong Enough? Brute Force Attack on the Rise!

Is Your Password Strong Enough? Brute Force Attack on the Rise!

In today’s technologically advanced world, our online accounts provide access to everything from personal information and funds to professional networks and interactions. Securing these accounts with strong passwords is critical. However, a ...
Cloud Security Stories: From Risky Permissions to Ransomware Execution

Cloud Security Stories: From Risky Permissions to Ransomware Execution

In the sprawling cloud infrastructure of GlobalTech Inc., a meticulously planned ransomware attack was set in motion by a sophisticated adversary, codenamed Vector. Vector’s objective wasn’t just to encrypt data for a ...
Akira ransomware

Akira Ransomware Group Takes in $42 Million From 250 Attacks in a Year

| | Akira, cisa, Linux, Ransomware
CISA and the FBI profile a highly adaptable and constantly evolving threat gang that targets both Windows and Linux systems ...
Security Boulevard
LabHost PhaaaS phishing

LabHost Phishing Platform is Latest Target of International Law Agencies

The takedown of the phishing-as-a-service operation follows similar law enforcement actions against threat groups LockBit and BlackCat ...
Security Boulevard
snake

Vulnerabilities for AI and ML Applications are Skyrocketing

In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code Execution indicates an urgent need to improve security measures in AI development ...
Security Boulevard
Get a demo

Roku experiences another data breach; Apple notifies users about mercenary spyware attacks

It’s rare to see a data breach study observers call a “mixed bag.” Normally, reports on data breaches are grim, touting how each year was a record high for the number of ...

Alert: Pixel Phones’ Exploited Android Zero-Day Flaw Patched

In the realm of smartphone security, the recent spotlight has fallen on Google Pixel devices, where two zero-day vulnerabilities have been unearthed and promptly addressed by Google. As per recent reports, the ...

Potential Risk Indicator Decay and Insider Risk Management

Who among us hasn’t received an answer to what we thought was a precise question with, “it depends” and our mind remains befuddled. Potential Risk Indicators are like that: on the surface ...

Secure Guardrails