threats. attacks, insider threat, employee, compliance data privacy shield security remote work

3 Tips to Protect Employees From External Exploitation Threats

Here's how credentialed insider attacks work and how to avoid situations where user negligence can lead to successful attacks ...
Security Boulevard
ransom networking ransomware

Understanding the Progression of a Ransomware Attack

Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are ...
Security Boulevard
converged, identity Permiso PAM, cybersecurity, credentials, identity, security, credentials authorization PAM governance digital identity IAM authorization

Permiso Discovers Smishing Attack to Steal AWS Credentials

Permiso, a provider of a platform for correlating IT events to identities, today disclosed the discovery of an attack through which cybercriminals are employing text messages to steal credentials that enable them ...
Security Boulevard
LastPass passwords credentials

Weak Passwords Offer Easy Access to Enterprise Networks

Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...
Security Boulevard
How Information Stealers Get User Credentials

How Information Stealers Get User Credentials

Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the simplicity and depth of this tactic is the Uber breach by threat ...
LastPass passwordless

LastPass Breach Raises Disclosure Transparency Concerns

In the graphic novel “The Watchman” by Alan Moore and Dave Gibbons, one of the recurring themes is ‘Who watches the watchers?’, a question originally posed by the Roman poet Juvenal as ...
Security Boulevard
malware Slack

Malware Families Love Telegram, Discord as Much as Users

Messaging apps like Discord and Telegram have become a conduit for malware, as their popularity grows among users who want to create and share programs on the platforms. These bots may facilitate ...
Security Boulevard

Gone Ape? How to Protect NFTs from Theft

What are NFTs? Non-fungible tokens (NFTs) are unique and irreplaceable digital assets that, by their nature, have an intrinsic value. These could be digital art, photography, GIFs, avatars, memes, 3D objects, domain ...
MITRE Splunk DLL sideloading ransomware Iran cybersecurity attack Security

Five Security Lessons From the Lapsus$ Attacks

Threat groups like Lapsus$ are increasingly targeting the blind spots in otherwise robust corporate cybersecurity programs ...
Security Boulevard

Why ATO Attacks Are Attacks on Your Customers

Motivated by the continual surge in eCommerce, which according to UNCTAD has seen unprecedented growth during the COVID-19 pandemic, retailers are scrambling to adapt to a shift in consumer demand and create ...