Volt Typhoon Malware: US Critical Infrastructure Breached

In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...
collaboration telecom, threat actors

Does Your Security Team Need a Dedicated Collaboration Tool?

Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
Security Boulevard
generative AI security, Microsoft AI cybersecurity

Innovation With a Security-First Mindset 

Prioritizing a robust security-first position does not have to hinder productivity or the ability of teams to achieve business goals ...
Security Boulevard

Microsoft Storm-1152 Crackdown: Stopping Threat Actors

In a significant stride against cybercrime, Microsoft has declared victory in dismantling cybercrime operations of Storm-1152. This group, a major player in the cybercrime-as-a-service (CaaS) ecosystem, was involved in selling access to ...
Charlotte Baker

Black Hat: The Importance of Collaboration With Digital Hands’ Charlotte Baker

Shira Rubinoff: This is Shira Rubinoff here at Black Hat, coming at you live. I’m here with Charlotte Baker, CEO of Digital Hands. Charlotte, it’s such a pleasure to see you again ...
Security Boulevard

Maximizing Output: The Link between Cloud Infrastructure Security and Team Productivity

Effective teamwork and seamless collaboration are crucial for the success of any organization. In today’s digital age, where data is stored and accessed through cloud infrastructure, ensuring robust security measures is paramount ...
vulnerability ConnectWise

The Essential Guide to Securing Hybrid Workplace Environments

From here on out, hybrid and remote work are here to stay. Unfortunately, this seismic shift in the way we work has expanded the attack surface for opportunistic cybercriminals. Mimecast’s 2022 state ...
Security Boulevard
Google Kubernetes vulnerabilities

Decentralized IT Clouds Security Team’s Ability to Spot Risks

The shadow IT trend has been underway for some time, but if a recent survey from Zoho ManageEngine is any indication, the amount of decentralized IT decision-making has passed an inflection point ...
Security Boulevard
PII Microsoft Koverse data protection impact assessment DPIA Dell AWS data protection cybersecurity

Auth Token Mining Weakens Microsoft Teams Security

Microsoft Teams users, beware. Anyone signed into the app can have their credentials stolen by miscreants with file system access who follow an attack path recently identified by the Vectra Protect team ...
Security Boulevard
security collaboration Cohesity The Time for Collaborative Security Is Now

Survey Surfaces Need For More Security Collaboration

A survey of more than 2,000 IT decision-makers and security operations (SecOps) professionals in the U.S., United Kingdom and Australia found lots of room for improvement when it comes to the way ...
Security Boulevard