Top Threat Detections Can Identify Suspicious Activity

Here’s an understatement: the cloud has changed everything. Another one: Microsoft is a target of threat actors. So, it seems to track that 71% of users have suffered an account takeover of a legitimate user’s account, on average, seven times in the y… Continue reading Top Threat Detections Can Identify Suspicious Activity

Ransomware Gang Frees Irish Medical Data—but Leak Threat Remains

Ireland’s Health Service Executive suffered a catastrophic ransomware attack last week. But now the gang seems to have had a change of heart.
The post Ransomware Gang Frees Irish Medical Data—but Leak Threat Remains appeared first on Security Boulevar… Continue reading Ransomware Gang Frees Irish Medical Data—but Leak Threat Remains

Colonial’s Ransom Payment Indicates Severity of Threats

Last week Joseph Blount, the CEO of Colonial Pipeline, told The Wall Street Journal that he authorized the ransom payment of $4.4. million to the hackers who broke into computer systems and caused major disruption to the East Coast’s gas supply. In th… Continue reading Colonial’s Ransom Payment Indicates Severity of Threats

FBI Logs Rapid Increase in Email Scams, Investment Fraud

The FBI reported complaints concerning online scams and investment fraud have now reached a record-breaking level. The FBI’s Internet Crime Complaint Center (IC3) received its six millionth complaint on May 15, 2021. It took nearly seven years for the… Continue reading FBI Logs Rapid Increase in Email Scams, Investment Fraud

Ask Chloé: Hackers’ Rights and Women in Infosec

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé explores hackers’ rights and the challenges women face in… Continue reading Ask Chloé: Hackers’ Rights and Women in Infosec

Ransomware Susceptibility Index Spells Trouble for Pharma

Take heed, pharmaceutical manufacturers – 10% of you are at high risk of suffering a ransomware attack. It may come as no surprise that you’re in the crosshairs of attackers; any organization in health care or the medical field, especially the c… Continue reading Ransomware Susceptibility Index Spells Trouble for Pharma

High Court Deals Blow to Data Privacy Regulations

Like the Kubler-Ross stages of grief, there are multiple stages of data breach. Anger, denial, blame, investigation, litigation, regulation and, ultimately, resignation. This includes possible class action litigation by consumers, banks, vendors, supp… Continue reading High Court Deals Blow to Data Privacy Regulations

Fake Chrome Extensions: Google Asleep at the Switch

That “Microsoft Authenticator” extension you installed is actually malware, designed to phish for your passwords.
The post Fake Chrome Extensions: Google Asleep at the Switch appeared first on Security Boulevard.
Continue reading Fake Chrome Extensions: Google Asleep at the Switch

Chatbots, Maintenance and Monitoring: Security Automation

Last week the Identity Theft Resource Center (ITRC) unveiled its virtual victim assistant, ViViAN, to serve identity crime victims after-hours and on weekends. Developed in partnership with the SAS Institute, an anti-fraud software and services compan… Continue reading Chatbots, Maintenance and Monitoring: Security Automation