Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
threats. attacks, insider threat, employee, compliance data privacy shield security remote work

3 Tips to Protect Employees From External Exploitation Threats

Here's how credentialed insider attacks work and how to avoid situations where user negligence can lead to successful attacks ...
Security Boulevard
Pepsi PBV data breach deep fakes Astoria Company hack

Third Party Lets Pepsi Data Out of the Bottle, PII Nicked

Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ...
Security Boulevard
Latitude Financial data breach timeline

The Biggest Data Breach in Australian History: An awakening for Organizations

The biggest data breach in 2023 so far was at Latitude Financial, an Australian financial services company. The breach, discovered in March 2023, exposed the personal information of more than 14 million ...
Data breach in June 2023

Data Breaches in June 2023 – Infographic

A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, ...

How Advances in IT Security are Assisting in The Fight Against Data Breaches

With the rise of the digital age, businesses have experienced unprecedented growth and opportunities. Advanced technology has streamlined processes and provided practical access to global markets. However, alongside these benefits, there is ...
What is RepoJacking and How Organizations are Vulnerable to It?

What is RepoJacking and How Organizations are Vulnerable to It?

Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as RepoJacking. RepoJacking involves a malicious actor intentionally taking over the account of ...
White House CISA open source cybersecurity low-code/no-code application CISA cybersecuity threat cybersecurity fellowship web app election security government

CISA Pressures Federal Civilian Agencies to Secure Network Devices

CISA put federal civilian agencies on notice that they were expected to secure network devices within 14 days of discovering they had been exposed on the internet ...
Security Boulevard