Alarming Intrusion: Chinese Government Hackers Target US Internet Providers

Alarming Intrusion: Chinese Government Hackers Target US Internet Providers

A recent Washington Post report sent shockwaves through the cybersecurity landscape, revealing that Chinese government-backed hackers have infiltrated at least two major US internet service providers (ISPs) and several smaller ones ...
volunteers, infrastructure, cybersecurity,

DEF CON Calls for Cybersecurity Volunteers to Defend Critical Infrastructure

DEF CON conference organizations are looking for volunteers to join a Franklin initiative to help secure critical infrastructure and school systems that lack the expertise required to defend themselves against cyberattacks ...
Security Boulevard
threat modeling, ICS, VPNs, APIs, risk, left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

Web-Connected Industrial Control Systems Vulnerable to Attack

| | HMI, ICS, Infrastructure, VPN
Half of the 40,000 internet-connected industrial control systems (ICS) devices in the U.S., more than half of which are associated with building control and automation protocols, run low-level automation protocols found in ...
Security Boulevard

Simplifying Infrastructure Management with Imperva’s Terraform Module for Cloud WAF

In today’s rapidly evolving technological landscape, managing infrastructure efficiently is paramount for businesses striving to stay competitive. With the rise of cloud computing, Infrastructure as Code (IaC) has emerged as a game-changer, ...
cyberattacks, attacks, malware, environment data cyberattacks defend wiper hermeticwiper malware wiper file systems storage Zerologon

Cyberattack Rate Surges as Novel Malware Growth Accelerates

The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intelligence Report ...
Security Boulevard
a laptop on a wooden desk.

API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes

AI is rapidly increasing the pace of API creation within organizations, leading to API security becoming as significant as traditional application security. Here’s what you can learn from the top five API ...
Security Boulevard

Backdoor in XZ Utils That Almost Happened

Last week, the Internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s ...
NETSCOUT cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

CISA Unveils Critical Infrastructure Reporting Rule

The Cybersecurity and Infrastructure Security Agency (CISA) issued a Notice of Proposed Rulemaking (NPRM) for the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) of 2022. Under this rule, covered entities must ...
Security Boulevard
EU logo

Guide to New CSRD Regulation for Data Center Operators

| | Infrastructure
In the ever-evolving landscape of corporate sustainability, the European Union's Corporate Sustainability Reporting Directive (CSRD) stands as a landmark regulation, redefining reporting obligations for businesses operating within or having a significant presence ...

The Cool Evolution: Liquid Cooling in Data Centers

| | Infrastructure
In the high-stakes, high-tech world of data centers, one trend is making waves—and chills—across the industry. Liquid cooling, once a novelty, is rapidly becoming a mainstream solution for keeping the data-driven planet ...

Application Security Check Up