{"id":1584595,"date":"2017-08-21T11:37:07","date_gmt":"2017-08-21T17:37:07","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1584595"},"modified":"2018-06-30T21:04:45","modified_gmt":"2018-07-01T01:04:45","slug":"cybersecurity-news","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/cybersecurity-news\/","title":{"rendered":"Cybersecurity News"},"content":{"rendered":"<div id=\"pl-1584595\"  class=\"panel-layout\" ><div id=\"pg-1584595-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1584595-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1584595-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1584595-0-0-0\" >\t\t\t<div class=\"textwidget\"><p>Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats &amp; Breaches and more.<\/p>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1584595-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys\" id=\"pt-cv-view-f367391uc6\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"1348455oi5\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037657\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Interpol Operation Synergia ransomware phishing\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-300x117.jpg 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1024x399.jpg 1024w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-768x299.jpg 768w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1536x598.jpg 1536w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0.jpg 1540w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037607\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self cvplbd\" target=\"_self\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#1348455oi5\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#1348455oi5\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-ca09303lqz\">#pt-cv-view-f367391uc6 .pt-cv-title a, #pt-cv-view-f367391uc6  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-f367391uc6 .pt-cv-title a, #pt-cv-view-f367391uc6  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-f367391uc6 .pt-cv-title a, #pt-cv-view-f367391uc6  .panel-title { font-size: 14px !important }}\n#pt-cv-view-f367391uc6 .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-f367391uc6 .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-f367391uc6 .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-f367391uc6 .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1584595-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore\" id=\"pt-cv-view-65bf617vqx\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037597\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Three tiny people cleaning the inside of a hard drive\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/automatic-updates\/' title='automatic updates' class='pt-cv-tax-automatic-updates'>automatic updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-storage\/' title='data storage' class='pt-cv-tax-data-storage'>data storage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware\/' title='firmware' class='pt-cv-tax-firmware'>firmware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-patch\/' title='firmware patch' class='pt-cv-tax-firmware-patch'>firmware patch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-security\/' title='firmware security' class='pt-cv-tax-firmware-security'>firmware security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-update\/' title='firmware update' class='pt-cv-tax-firmware-update'>firmware update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-updates\/' title='Firmware Updates' class='pt-cv-tax-firmware-updates'>Firmware Updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-disk-drive\/' title='hard disk drive' class='pt-cv-tax-hard-disk-drive'>hard disk drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-drive\/' title='hard drive' class='pt-cv-tax-hard-drive'>hard drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/os-security-updates\/' title='os security updates' class='pt-cv-tax-os-security-updates'>os security updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qnap\/' title='QNAP' class='pt-cv-tax-qnap'>QNAP<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qts\/' title='QTS' class='pt-cv-tax-qts'>QTS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/raid\/' title='RAID' class='pt-cv-tax-raid'>RAID<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/release-management\/' title='Release Management' class='pt-cv-tax-release-management'>Release Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-update\/' title='security update' class='pt-cv-tax-security-update'>security update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/storage\/' title='storage' class='pt-cv-tax-storage'>storage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037509\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"military\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/ai-generated-8662832_1280-1-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self cvplbd\" target=\"_self\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/elasticsearch\/' title='elasticsearch' class='pt-cv-tax-elasticsearch'>elasticsearch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/enamelpins\/' title='enamelpins' class='pt-cv-tax-enamelpins'>enamelpins<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/leaked-data\/' title='leaked data' class='pt-cv-tax-leaked-data'>leaked data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037379\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/nile-releases-zero-trust-as-a-service-aimed-at-delivering-ransomware-protection-natively-without-operational-headaches\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Nile\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Nile-Trust-Service-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/nile-releases-zero-trust-as-a-service-aimed-at-delivering-ransomware-protection-natively-without-operational-headaches\/\" class=\"_self cvplbd\" target=\"_self\" >Nile Releases Zero Trust-as-a-Service Aimed at Delivering Ransomware Protection Natively Without Operational Headaches<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Sulagna Saha<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T16:17:54-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/gestaltit\/' title='@GestaltIT' class='pt-cv-tax-gestaltit'>@GestaltIT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nilesecure\/' title='@NileSecure' class='pt-cv-tax-nilesecure'>@NileSecure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/techfieldday\/' title='@TechFieldDay' class='pt-cv-tax-techfieldday'>@TechFieldDay<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/writeroftech1\/' title='@WriterOfTech1' class='pt-cv-tax-writeroftech1'>@WriterOfTech1<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Nile is working to make Local Area Network (LAN) invulnerable by design; its latest effort to stop ransomware and lateral movement attacks. The networking-as-a-service vendor, on Thursday, announced the launch of Nile Trust Service, an add-on solution that it said will end the need to deploy a medley of localized ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/nile-releases-zero-trust-as-a-service-aimed-at-delivering-ransomware-protection-natively-without-operational-headaches\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037360\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"North Korea IT worker scam\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fake-it-worker-scam\/' title='fake IT worker scam' class='pt-cv-tax-fake-it-worker-scam'>fake IT worker scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-cyber-espionage\/' title='North Korean cyber espionage' class='pt-cv-tax-north-korean-cyber-espionage'>North Korean cyber espionage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037237\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"A D-Link DSR-250N, which is now EOL\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037076\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-adds-raft-of-zero-trust-tools-and-platforms\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"platforms, security, tool, tooling, AI coding, tools, tools cybersecurity multi-tool\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/11\/tools-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-adds-raft-of-zero-trust-tools-and-platforms\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Adds Raft of Zero-Trust Tools and Platforms<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/Michael-Vizard_avatar_1507143790-40x40.png' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/Michael-Vizard_avatar_1507143790-80x80.png 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Michael Vizard<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T14:17:27-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai\/' title='AI' class='pt-cv-tax-ai'>AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-security\/' title='Data Security' class='pt-cv-tax-data-security'>Data Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/tools\/' title='tools' class='pt-cv-tax-tools'>tools<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Microsoft this week launched a raft of cybersecurity initiatives that address everything from making Windows platforms more secure to adding platforms that are more secure by design ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-adds-raft-of-zero-trust-tools-and-platforms\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037060\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"David \u201cdwizzzle\u201d Weston\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Veeps Ignite Fire Under CrowdStrike<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:03:14-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike\/' title='CrowdStrike' class='pt-cv-tax-crowdstrike'>CrowdStrike<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-falcon\/' title='CrowdStrike Falcon' class='pt-cv-tax-crowdstrike-falcon'>CrowdStrike Falcon<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-incident\/' title='CrowdStrike incident;' class='pt-cv-tax-crowdstrike-incident'>CrowdStrike incident;<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-updates\/' title='crowdstrike updates' class='pt-cv-tax-crowdstrike-updates'>crowdstrike updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/david-weston\/' title='David Weston' class='pt-cv-tax-david-weston'>David Weston<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ignite\/' title='ignite' class='pt-cv-tax-ignite'>ignite<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-security\/' title='Microsoft security' class='pt-cv-tax-microsoft-security'>Microsoft security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-virus-initiative\/' title='Microsoft Virus Initiative' class='pt-cv-tax-microsoft-virus-initiative'>Microsoft Virus Initiative<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-windows\/' title='Microsoft Windows' class='pt-cv-tax-microsoft-windows'>Microsoft Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quick-machine-recovery\/' title='Quick Machine Recovery' class='pt-cv-tax-quick-machine-recovery'>Quick Machine Recovery<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/rust\/' title='rust' class='pt-cv-tax-rust'>rust<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/safe-deployment-practices\/' title='Safe Deployment Practices' class='pt-cv-tax-safe-deployment-practices'>Safe Deployment Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows\/' title='Windows' class='pt-cv-tax-windows'>Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows-security\/' title='Windows security' class='pt-cv-tax-windows-security'>Windows security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037018\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"CISOs, leadership, security third-party supply chainCISO role\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/05\/Leadership-Security-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self cvplbd\" target=\"_self\" >CISOs Look to Establish Additional Leadership Roles<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/nathan-eddy\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/e6599346911a94e19de7d259040bf92d?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/e6599346911a94e19de7d259040bf92d?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Nathan Eddy<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T10:49:16-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compensation\/' title='compensation' class='pt-cv-tax-compensation'>compensation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ians\/' title='ians' class='pt-cv-tax-ians'>ians<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/it-security\/' title='IT Security' class='pt-cv-tax-it-security'>IT Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/recruiting\/' title='recruiting' class='pt-cv-tax-recruiting'>recruiting<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">According to an IANS survey of more than 800 CISOs, roles such as business information security officers (BISOs), chiefs of staff and heads for privacy, program management and data protection are among the top positions being considered to support cybersecurity efforts ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season gets underway, according to cybersecurity firms ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036973\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"water system cyberthreats EPA OIG\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self cvplbd\" target=\"_self\" >EPA IG Office: \u2018High-Risk\u2019 Security Flaws in Hundreds of Water Systems<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T16:15:39-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cyber-attack-on-critical-infrastructure\/' title='cyber attack on critical infrastructure' class='pt-cv-tax-cyber-attack-on-critical-infrastructure'>cyber attack on critical infrastructure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/epa\/' title='EPA' class='pt-cv-tax-epa'>EPA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/public-water-systems\/' title='public water systems' class='pt-cv-tax-public-water-systems'>public water systems<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerabilities\/' title='Vulnerabilities' class='pt-cv-tax-vulnerabilities'>Vulnerabilities<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had \"critical\" or \"high-risk\" security flaws and another 211 had less dangerous vulnerabilities, risking threats from stolen data to disrupted service ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1584595\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"246\" data-nextpages=\"2\" data-sid=\"65bf617vqx\" data-unid=\"\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-51e15ecntf\">#pt-cv-view-65bf617vqx .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-65bf617vqx  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-65bf617vqx .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-65bf617vqx .pt-cv-title a, #pt-cv-view-65bf617vqx  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx  .pt-cv-title a:hover, #pt-cv-view-65bf617vqx  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-65bf617vqx .pt-cv-content , #pt-cv-view-65bf617vqx  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-65bf617vqx .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-65bf617vqx .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; }\n#pt-cv-view-65bf617vqx .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='65bf617vqx'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='65bf617vqx'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats &amp; Breaches and more.<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1584595","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity News - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats &amp; Breaches and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/cybersecurity-news\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats &amp; Breaches and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/cybersecurity-news\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-01T01:04:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/cybersecurity-news\/\",\"url\":\"https:\/\/securityboulevard.com\/cybersecurity-news\/\",\"name\":\"Cybersecurity News - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2017-08-21T17:37:07+00:00\",\"dateModified\":\"2018-07-01T01:04:45+00:00\",\"description\":\"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats & Breaches and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/cybersecurity-news\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/cybersecurity-news\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/cybersecurity-news\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity News\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity News - Security Boulevard","description":"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats & Breaches and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/cybersecurity-news\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity News","og_description":"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats &amp; Breaches and","og_url":"https:\/\/securityboulevard.com\/cybersecurity-news\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-07-01T01:04:45+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/cybersecurity-news\/","url":"https:\/\/securityboulevard.com\/cybersecurity-news\/","name":"Cybersecurity News - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2017-08-21T17:37:07+00:00","dateModified":"2018-07-01T01:04:45+00:00","description":"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats & Breaches and more.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/cybersecurity-news\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/cybersecurity-news\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/cybersecurity-news\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity News"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-6EdZ","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1584595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1584595"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1584595\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1584595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}