ransomware port

Lockbit 3.0 Claims Credit for Ransomware Attack on Japanese Port

After a ransomware attack shuttered operations at container terminals at the Port of Nagoya in Japan, the Lockbit 3.0 ransomware gang claimed responsibility and demanded the port pay up. The attack on ...
Security Boulevard
Safe Security risk What’s Causing CISOs Stress

A Guide to Articulating Risk: Speaking the Language of the Stakeholder

The role of the modern CISO today is just as much about managing technical solutions as it is about communicating risk to key decision-making stakeholders. In their daily roles, most C-suite executives ...
Security Boulevard
privileged, accounts

A Policy of All Privileged Accounts – Overkill or Common Sense?

An attacker accessing a privileged account doesn’t begin with a root or administrator account. An attack on a privileged account usually starts with the theft of an average user’s credentials. Passwords are ...
Security Boulevard
MOVEit supply chain cloud security manufacturing remote

MOVEit Attack Strikes US and State Governments

A global attack campaign fueled by a vulnerability in MOVEit Transfer, a popular file transfer application, has now struck the U.S. Department of Energy, several other U.S. agencies and a spate of ...
Security Boulevard
Cybercrime Predictions from an Industry Veteran: Dan Schaupner

Cybercrime Predictions from an Industry Veteran: Dan Schaupner

Predicting the future of cybercrime has never been easy ...
Cybercrime Predictions from an Industry Veteran: Dr. Chase Cunningham

Cybercrime Predictions from an Industry Veteran: Dr. Chase Cunningham

Cybersecurity—and particularly cybercrime—has always been a volatile field ...
The 2 BIG Exceptions to Financially Motivated Cybercrime

The 2 BIG Exceptions to Financially Motivated Cybercrime

Cybercrime is all about money… except when it isn’t ...
Microsoft ransomware AWS Spring4Shell flaws vulnerabilities WhiteSource Python

The FBI Could Help Retrieve Your Data After a Ransomware Attack

To pay or not to pay? That is the question leadership and security teams ask whenever they deal with a ransomware attack. The recommendation from the FBI is to not pay, stating ...
Security Boulevard
Colonial Pipeline, lessons, vulnerabilities pipedream supply chains CI/CD pipeline dev environment Linux

Two Years After Colonial Pipeline, What Have We Learned?

The second anniversary of the Colonial Pipeline ransomware attack has come and gone, and while many lessons have been learned and assimilated, there’s still more we can do. Security Boulevard reached out ...
Security Boulevard