attack, hackers, black hat attacker celebrity Trickbot Emotet Black Shadow McAfee REvil ransomware Kaseya

Attacker ID’ed After Infecting Own Computer With Malware

A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
Security Boulevard

The Legacy of The Hacker Manifesto

I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
Smart Phone, Smart Watch, Smart Pay, Smart?

Smart Phone, Smart Watch, Smart Pay, Smart?

Smart Phone, Smart Watch, Smart Pay, Smart?How safe is smart?The idea of never needing to carry cash or debit cards looks pretty appealing, right? Never worry about someone trying to steal your ...
What is in Your SOC?

What is in Your SOC?

What is in Your SOC?Movie “300” credit — Warners Bros PicturesOffensive or defensive culture for SecOps- becoming purple?Organizations developing a Security operations center(SOC) should consider which strategy they should adopt based on ...
provenance cybersecurity Akamai

The Power of Provenance: From Reactive to Proactive Cybersecurity

While next-gen firewalls (NGFW), extended detection and response (XDR) and other security solutions do a great job of detecting and thwarting cyberattacks, it’s just too common for a sneaky or camouflaged threat ...
Security Boulevard
Geopolitical Cyber Attacks — The New Battlefield

Geopolitical Cyber Attacks — The New Battlefield

Geopolitical Cyber Attacks — The New BattlefieldModern Data Communications in VietnamThe new battlefield on display in the conflict between Russia and Ukraine war shows a progression of cybersecurity tactics revolutionizing the overall ...
Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea's Internet

Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet

Researchers have discovered a new web tracking technique using your graphics card, scammers are exploiting security weaknesses on job recruitment websites to post fraudulent job postings, and how a hacker single-handedly took ...
Compromised Twitter accounts

British man arrested in connection with Twitter mega-hack that posted cryptocurrency scam from celebrity accounts

Police in Spain have arrested a British man in connection with what many consider the worst hack in Twitter’s history. In July 2020, the Twitter accounts of public figures and well-known organisations ...
Why do hackers use the same methods over again?”

Why do hackers use the same methods over again?”

Why do hackers use the same methods over again?”“Repeating oneself and expecting the different result” is the clear definition of insanity. Yet, hackers for 25 years have similar tactics like brute force, ...