Visualização normal

Antes de ontemStream principal
  • ✇Security Boulevard
  • North Korea’s Enormous Crypto Hacks Redefine Scale and Strategy James Maguire
    A pair of tightly executed cyberattacks have become milestones in cryptocurrency theft in 2026 due to their sheer size. These two incidents, targeting Drift Protocol and KelpDAO, account for roughly three quarters of all recorded crypto losses through April, revealing a shift toward fewer, higher-dollar operations. Based on a report from TRM Labs, security researchers.. The post North Korea’s Enormous Crypto Hacks Redefine Scale and Strategy appeared first on Security Boulevard.
     

North Korea’s Enormous Crypto Hacks Redefine Scale and Strategy

1 de Maio de 2026, 16:14

A pair of tightly executed cyberattacks have become milestones in cryptocurrency theft in 2026 due to their sheer size. These two incidents, targeting Drift Protocol and KelpDAO, account for roughly three quarters of all recorded crypto losses through April, revealing a shift toward fewer, higher-dollar operations. Based on a report from TRM Labs, security researchers..

The post North Korea’s Enormous Crypto Hacks Redefine Scale and Strategy appeared first on Security Boulevard.

  • ✇Security Boulevard
  • U.S. Consumers Lost $2.1 Billion in Social Media Scams in 2025, FTC Says Jeffrey Burt
    An FTC report says that Americans last year lost $2.1 billion in social media scams, such as shopping and investment schemes. Social media site have become the place where most of these scams start, and more than half of that money was stolen in scams began on Facebook, WhatsApp, and Instagram. The post U.S. Consumers Lost $2.1 Billion in Social Media Scams in 2025, FTC Says appeared first on Security Boulevard.
     

U.S. Consumers Lost $2.1 Billion in Social Media Scams in 2025, FTC Says

1 de Maio de 2026, 09:47

An FTC report says that Americans last year lost $2.1 billion in social media scams, such as shopping and investment schemes. Social media site have become the place where most of these scams start, and more than half of that money was stolen in scams began on Facebook, WhatsApp, and Instagram.

The post U.S. Consumers Lost $2.1 Billion in Social Media Scams in 2025, FTC Says appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Sevii Adds Ability to Dynamically Deploy AI Agents to Combat Cyberattacks Michael Vizard
    By leveraging Myrmidon Defense Technology (MDT), Sevii enables cybersecurity teams to orchestrate autonomous AI agent swarms to hunt, isolate, and remediate threats at machine speed. This "AI fire with AI fire" approach addresses the critical shortage of security professionals while offering a fixed-cost model that eliminates the unpredictability of AI token consumption. The post Sevii Adds Ability to Dynamically Deploy AI Agents to Combat Cyberattacks appeared first on Security Boulevard.
     

Sevii Adds Ability to Dynamically Deploy AI Agents to Combat Cyberattacks

29 de Abril de 2026, 10:07

By leveraging Myrmidon Defense Technology (MDT), Sevii enables cybersecurity teams to orchestrate autonomous AI agent swarms to hunt, isolate, and remediate threats at machine speed. This "AI fire with AI fire" approach addresses the critical shortage of security professionals while offering a fixed-cost model that eliminates the unpredictability of AI token consumption.

The post Sevii Adds Ability to Dynamically Deploy AI Agents to Combat Cyberattacks appeared first on Security Boulevard.

  • ✇Security Boulevard
  • China-Backed Groups are Using Massive Botnets in Espionage, Intrusion Campaigns Jeffrey Burt
    China-sponsored threat groups like Salt Typhoon and Flax Typhoon are increasingly relying on multiple massive botnets comprising edge and IoT devices to run their cyber espionage and network intrusion campaigns, CISA and other security agencies say. The use of such "covert networks" makes it more difficult to detect and mitigate their campaigns. The post China-Backed Groups are Using Massive Botnets in Espionage, Intrusion Campaigns appeared first on Security Boulevard.
     

China-Backed Groups are Using Massive Botnets in Espionage, Intrusion Campaigns

27 de Abril de 2026, 09:32
Chinese, A PRC flag flies atop a metal flagpole

China-sponsored threat groups like Salt Typhoon and Flax Typhoon are increasingly relying on multiple massive botnets comprising edge and IoT devices to run their cyber espionage and network intrusion campaigns, CISA and other security agencies say. The use of such "covert networks" makes it more difficult to detect and mitigate their campaigns.

The post China-Backed Groups are Using Massive Botnets in Espionage, Intrusion Campaigns appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Unauthorized Users Reportedly Gain Access to Anthropic’s Mythos AI Model Jeffrey Burt
    A group of unauthorized users reportedly has gained access to Anthropic’s controversial Claude Mythos Preview AI frontier model despite the AI vendor’s efforts to keep it out of public hands by limiting the organizations that can use it. Bloomberg reported that the unnamed group had tried multiple ways to gain access to the AI model.. The post Unauthorized Users Reportedly Gain Access to Anthropic’s Mythos AI Model appeared first on Security Boulevard.
     
  • ✇Security Boulevard
  • When Geopolitics Writes Your Compliance Roadmap Jack Poller
    Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures materialize long after the damage lands on someone else’s balance sheet. NCC Group’s fifth edition of its Global Cyber Policy Radar suggests that cycle is finally breaking — not because governments have gotten smarter, but because the.. The post When Geopolitics Writes Your Compliance Roadmap appeared first on Security Boulevard.
     

When Geopolitics Writes Your Compliance Roadmap

17 de Abril de 2026, 15:11

Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures materialize long after the damage lands on someone else’s balance sheet. NCC Group’s fifth edition of its Global Cyber Policy Radar suggests that cycle is finally breaking — not because governments have gotten smarter, but because the..

The post When Geopolitics Writes Your Compliance Roadmap appeared first on Security Boulevard.

  • ✇Security Boulevard
  • NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work Jeffrey Burt
    NIST said it overwhelmed by the surge in the number of CVEs submissions in recent years, so it is paring back the analysis work it does on the dangerous security flaws. Security experts say the number of new vulnerabilities detected will only grow during the AI era and that the private sector will need to pick up the slack left by NIST's decision. The post NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work appeared first on Security Boulevard.
     

NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work

17 de Abril de 2026, 14:59
NIST CSF vulnerabilities ransomware backlog

NIST said it overwhelmed by the surge in the number of CVEs submissions in recent years, so it is paring back the analysis work it does on the dangerous security flaws. Security experts say the number of new vulnerabilities detected will only grow during the AI era and that the private sector will need to pick up the slack left by NIST's decision.

The post NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Capsule Security Emerges From Stealth to Secure AI Agents at Runtime Michael Vizard
    Capsule Security emerges from stealth with a $7M seed round to launch a runtime security platform for AI agents. Featuring the open-source ClawGuard, the platform enforces governance and mitigates prompt injection risks like ShareLeak and PipeLeak without requiring SDKs or proxies. The post Capsule Security Emerges From Stealth to Secure AI Agents at Runtime appeared first on Security Boulevard.
     

Capsule Security Emerges From Stealth to Secure AI Agents at Runtime

15 de Abril de 2026, 09:00
Capsule, capsule security,

Capsule Security emerges from stealth with a $7M seed round to launch a runtime security platform for AI agents. Featuring the open-source ClawGuard, the platform enforces governance and mitigates prompt injection risks like ShareLeak and PipeLeak without requiring SDKs or proxies.

The post Capsule Security Emerges From Stealth to Secure AI Agents at Runtime appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Banning Routers Won’t Secure the Internet Alan Shimel
    Washington’s push to ban foreign-made Wi-Fi routers may sound tough on cybersecurity, but like earlier bans on foreign drones and telecom gear it risks becoming security theater that ignores the real problem: Millions of unpatched devices already sitting on American networks. The post Banning Routers Won’t Secure the Internet appeared first on Security Boulevard.
     

Banning Routers Won’t Secure the Internet

6 de Abril de 2026, 06:53

Washington’s push to ban foreign-made Wi-Fi routers may sound tough on cybersecurity, but like earlier bans on foreign drones and telecom gear it risks becoming security theater that ignores the real problem: Millions of unpatched devices already sitting on American networks.

The post Banning Routers Won’t Secure the Internet appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Cyberattacks Spike 245% in the Two Weeks After the Start of War With Iran Jeffrey Burt
    Akamai researchers saw a 245% spike in cyberattacks in the first two weeks after the start of the U.S. and Israeli war against Iran as Iranian nation-state groups and independent hacktivists launch increasingly decentralized and destructive cyberattacks, which are expected to increase as long as the kinetic battle continues. The post Cyberattacks Spike 245% in the Two Weeks After the Start of War With Iran appeared first on Security Boulevard.
     
  • ✇Security Boulevard
  • AI Agents Present ‘Insider Threat’ as Rogue Behaviors Bypass Cyber Defenses: Study Jon Swartz
    Artificial intelligence (AI) agents, once touted as the next frontier of corporate efficiency, are increasingly exhibiting deceptive and rogue behaviors that could overwhelm traditional cybersecurity. New research shows autonomous systems are now capable of collaborating to smuggle sensitive data, forge credentials, and even peer-pressure other AIs into bypassing safety protocols. According to findings from Irregular,.. The post AI Agents Present ‘Insider Threat’ as Rogue Behaviors Bypass Cyber
     

AI Agents Present ‘Insider Threat’ as Rogue Behaviors Bypass Cyber Defenses: Study

13 de Março de 2026, 16:19

Artificial intelligence (AI) agents, once touted as the next frontier of corporate efficiency, are increasingly exhibiting deceptive and rogue behaviors that could overwhelm traditional cybersecurity. New research shows autonomous systems are now capable of collaborating to smuggle sensitive data, forge credentials, and even peer-pressure other AIs into bypassing safety protocols. According to findings from Irregular,..

The post AI Agents Present ‘Insider Threat’ as Rogue Behaviors Bypass Cyber Defenses: Study appeared first on Security Boulevard.

  • ✇Security Boulevard
  • 112 or 22 to 2: Who Moved the Vulnerability Cheese? Alan Shimel
    AI can now scan codebases and generate hundreds of potential vulnerabilities in minutes. But when 112 bug reports collapse into 22 confirmed flaws and only two exploitable issues, the real disruption is how AI is reshaping the entire vulnerability lifecycle. The post 112 or 22 to 2: Who Moved the Vulnerability Cheese? appeared first on Security Boulevard.
     
  • ✇Security Boulevard
  • FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System Jeffrey Burt
    The FBI, CISA, and NSA reportedly are investigating the hack by an unnamed "sophisticated" actor of a FBI surveillance system that holds sensitive information. The breach carries the hallmarks of Chinese nation-state groups and comes amid concerns about attacks in the wake of the war against Iran and the shrinking of the federal cybersecurity apparatus. The post FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System appeared first on Security Boulevard.
     

FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System

6 de Março de 2026, 18:00
SEC rules, cybersecurity, SEC cyber data breach rules

The FBI, CISA, and NSA reportedly are investigating the hack by an unnamed "sophisticated" actor of a FBI surveillance system that holds sensitive information. The breach carries the hallmarks of Chinese nation-state groups and comes amid concerns about attacks in the wake of the war against Iran and the shrinking of the federal cybersecurity apparatus.

The post FBI is Investigating the ‘Sophisticated’ Hack of Its Surveillance System appeared first on Security Boulevard.

  • ✇Security Boulevard
  • Things Were Even Worse at CISA Than We Thought Alan Shimel
    Just last week I wrote that CISA was on life support. That was before we knew how bad it really was. When Jen Easterly stepped down and the agency was left without a Senate-confirmed director, it was already troubling. The Cybersecurity and Infrastructure Security Agency — the nerve center for defending federal networks and coordinating.. The post Things Were Even Worse at CISA Than We Thought appeared first on Security Boulevard.
     

Things Were Even Worse at CISA Than We Thought

28 de Fevereiro de 2026, 12:57

Just last week I wrote that CISA was on life support. That was before we knew how bad it really was. When Jen Easterly stepped down and the agency was left without a Senate-confirmed director, it was already troubling. The Cybersecurity and Infrastructure Security Agency — the nerve center for defending federal networks and coordinating..

The post Things Were Even Worse at CISA Than We Thought appeared first on Security Boulevard.

  • ✇Security Boulevard
  • HackerOne Adds AI Agent to Validate Vulnerabilities Michael Vizard
    HackerOne has added an artificial intelligence (AI) agent to its platform that validates whether a vulnerability actually exists within an IT environment to reduce the amount of time cybersecurity teams and application developers would otherwise spend researching a potential threat. Michiel Prins, head of product for HackerOne, said this extension to the Hai agentic AI.. The post HackerOne Adds AI Agent to Validate Vulnerabilities appeared first on Security Boulevard.
     

HackerOne Adds AI Agent to Validate Vulnerabilities

26 de Fevereiro de 2026, 19:41

HackerOne has added an artificial intelligence (AI) agent to its platform that validates whether a vulnerability actually exists within an IT environment to reduce the amount of time cybersecurity teams and application developers would otherwise spend researching a potential threat. Michiel Prins, head of product for HackerOne, said this extension to the Hai agentic AI..

The post HackerOne Adds AI Agent to Validate Vulnerabilities appeared first on Security Boulevard.

❌
❌