Normal view

Received yesterday — 13 February 2026

Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group

13 February 2026 at 03:11

In 2025, NSFOCUS Fuying Lab disclosed a new APT group targeting China’s scientific research sector, dubbed “ChainedShark” (tracking number: Actor240820). Been active since May 2024, the group’s operations are marked by high strategic coherence and technical sophistication. Its primary targets are professionals in Chinese universities and research institutions specializing in international relations, marine technology, and related […]

The post Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group appeared first on Security Boulevard.

Received before yesterday

Digital Hygiene for High-Profile Individuals

11 February 2026 at 22:08

Nisos
Digital Hygiene for High-Profile Individuals

Digital vulnerability isn't limited to corporate executives. Any individual with a public profile faces similar - and sometimes even greater - digital exposure risks...

The post Digital Hygiene for High-Profile Individuals appeared first on Nisos by Nisos

The post Digital Hygiene for High-Profile Individuals appeared first on Security Boulevard.

Managed SaaS Threat Detection | AppOmni Scout

4 February 2026 at 10:48

AppOmni Scout – Managed Threat Detection Service Expertise to detect SaaS and AI threats and protect your critical data SaaS and AI threat detection led by threat experts Security teams don’t have the resources for timely detection to protect critical data and employees from threats. Monitoring SaaS and AI is complex, time-intensive, and results in […]

The post Managed SaaS Threat Detection | AppOmni Scout appeared first on AppOmni.

The post Managed SaaS Threat Detection | AppOmni Scout appeared first on Security Boulevard.

Why Moltbook Changes the Enterprise Security Conversation

4 February 2026 at 08:34

For several years, enterprise security teams have concentrated on a well-established range of risks, including users clicking potentially harmful links, employees uploading data to SaaS applications, developers inadvertently disclosing credentials on platforms like GitHub, and chatbots revealing sensitive information. However, a notable shift is emerging—one that operates independently of user actions. Artificial intelligence agents are...

The post Why Moltbook Changes the Enterprise Security Conversation appeared first on Aryaka.

The post Why Moltbook Changes the Enterprise Security Conversation appeared first on Security Boulevard.

AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026

4 February 2026 at 06:10

Author : Karunakar Goud RGDate Published : February, 04, 2026 AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026 Artificial intelligence is no longer experimental. By 2026, AI systems are embedded in customer support, security operations, decision-making, and product development. As AI adoption accelerates, AI governance has become a […]

The post AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026 appeared first on Cyber security services provider, data privacy consultant | Secureflo.

The post AI Governance Explained: How to Control Risk, Stay Compliant, and Scale AI Safely in 2026 appeared first on Security Boulevard.

Top 5 PCI Compliant Hosting Providers

29 January 2026 at 19:35

Key Takeaways When companies run payment systems, those systems operate on infrastructure provided by hosting platforms. That layer includes the servers, networks, and data centers where applications live.  The term PCI compliance hosting is commonly used to describe infrastructure environments that have been structured with PCI-related security expectations in mind and that provide documentation and […]

The post Top 5 PCI Compliant Hosting Providers appeared first on Centraleyes.

The post Top 5 PCI Compliant Hosting Providers appeared first on Security Boulevard.

Employment Fraud & Hiring Risk: When Access Becomes Risk

29 January 2026 at 09:46

Nisos
Employment Fraud & Hiring Risk: When Access Becomes Risk

Hiring has long been treated as an administrative function. Once a candidate clears background checks and completes onboarding, trust is assumed...

The post Employment Fraud & Hiring Risk: When Access Becomes Risk appeared first on Nisos by Nisos

The post Employment Fraud & Hiring Risk: When Access Becomes Risk appeared first on Security Boulevard.

NSFOCUS Unveils Enhanced AI LLM Risk Threat Matrix for Holistic AI Security Governance

28 January 2026 at 22:38

SANTA CLARA, Calif., Jan 29, 2026 – Security is a prerequisite for the application and development of LLM technology. Only by addressing security risks when integrating LLMs can businesses ensure healthy and sustainable growth. NSFOCUS first proposed the AI LLM Risk Threat Matrix in 2024. The Matrix addresses security from multiple perspectives: foundational security, data security, […]

The post NSFOCUS Unveils Enhanced AI LLM Risk Threat Matrix for Holistic AI Security Governance appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post NSFOCUS Unveils Enhanced AI LLM Risk Threat Matrix for Holistic AI Security Governance appeared first on Security Boulevard.

The 7 Essential Elements of a Compliance Framework You Need to Know

26 January 2026 at 18:49

Key Takeaways Regulatory expectations continue to expand. Oversight bodies increasingly look beyond documentation to how organizations manage compliance risk in practice. In this environment, compliance functions best when supported by a structured framework. While industries and jurisdictions vary, effective, high-quality governance and compliance programs consistently rely on seven foundational elements. From Requirement Lists to Operating […]

The post The 7 Essential Elements of a Compliance Framework You Need to Know appeared first on Centraleyes.

The post The 7 Essential Elements of a Compliance Framework You Need to Know appeared first on Security Boulevard.

Hacktivists claim near-total Spotify music scrape

23 December 2025 at 07:28

Hacktivist group Anna’s Archive claims to have scraped almost all of Spotify’s catalog and is now seeding it via BitTorrent, effectively turning a streaming platform into a roughly 300 TB pirate “preservation archive.”

On its blog, the group states:

“A while ago, we discovered a way to scrape Spotify at scale. We saw a role for us here to build a music archive primarily aimed at preservation.”

Spotify insists that the hacktivists obtained no user data. Still, the incident highlights how large‑scale scraping, digital rights management (DRM) circumvention, and weak abuse controls can turn major content platforms into high‑value targets.

Anna’s Archive claims it obtained metadata for around 256 million tracks and audio files for roughly 86 million songs, totaling close to 300 TB. Reportedly, this represents about 99.9% of Spotify’s catalog and roughly 99.6% of all streams.

Spotify says it has “identified and disabled the nefarious user accounts that engaged in unlawful scraping” and implemented new safeguards.

From a security perspective, this incident is a textbook example of how scraping can escalate beyond “just metadata” into industrial‑scale content theft. By combining public APIs, token abuse, rate‑limit evasion, and DRM bypass techniques, attackers can extract protected content at scale. If you can create or compromise enough accounts and make them appear legitimate, you can chip away at content protections over time.

The “Spotify scrape” will likely be framed as a copyright story. But from a security angle, it serves as a reminder: if a platform exposes content or metadata at scale, someone will eventually automate access to it, weaponize it, and redistribute it.

And hiding behind violations of terms and conditions—which have never stopped criminals—is not effective security control.

How does this affect you?

There is currently no indication that passwords, payment details, or private playlists were exposed. This incident is purely about content and metadata, not user databases. That said, scammers may still claim otherwise. Be cautious of messages alleging your account data was compromised and asking for your login details.

Some general Spotify security tips, to be on the safe side:

  • If you have reused your Spotify password elsewhere or shared your credentials, consider changing your password for peace of mind.
  • Regularly review active sessions on streaming services and revoke anything you do not recognize. Spotify does not offer per-device session management, but you can sign out of all devices via Account > Settings and privacy on the Spotify website.
  • Avoid unofficial downloaders, converters, or “Spotify mods” that ask for your login or broad OAuth permissions. These tools often rely on the same kind of scraping infrastructure—or worse, function as credential-stealing malware.

We don’t just report on threats – we help protect your social media

Cybersecurity risks should never spread beyond a headline. Protect your social media accounts by using Malwarebytes Identity Theft Protection.

CISA Adds Oracle Identity Manager Vulnerability to KEV Database

24 November 2025 at 12:44

Oracle Identity Manager vulnerability RCE code

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added an Oracle Identity Manager vulnerability to its Known Exploited Vulnerabilities database after the SANS Internet Storm Center reported attack attempts on the flaw. CVE-2025-61757 is a 9.8-severity Missing Authentication for Critical Function vulnerability in the Identity Manager product of Oracle Fusion Middleware that was patched as part of Oracle’s October update and detailed in a blog post last week by Searchlight Cyber, which had discovered the vulnerability and reported it to Oracle. Following the Searchlight post, the SANS Internet Storm Center looked for exploitation attempts on the vulnerability and found evidence as far back as August 30. “Given the complexity of some previous Oracle Access Manager vulnerabilities, this one is somewhat trivial and easily exploitable by threat actors,” Searchlight Cyber said in its post. Cyble threat intelligence researchers had flagged the vulnerability as important following Oracle’s October update.

Oracle Identity Manager Vulnerability CVE-2025-61757 Explained

CVE-2025-61757 affects the REST WebServices component of Identity Manager in Oracle Fusion Middleware versions 12.2.1.4.0 and 14.1.2.1.0. The easily exploitable pre-authentication remote code execution (RCE) vulnerability could allow an unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of the vulnerability can result in takeover of Identity Manager. The Searchlight researchers began looking for vulnerabilities after an Oracle Cloud breach earlier this year exploited a host that Oracle had failed to patch for CVE-2021-35587. In the source code for the Oracle Identity Governance Suite, the researchers found that that the application compiles Groovy script but doesn’t execute it. Taking inspiration from a previous Java capture the flag (CTF) event, they noted that Java annotations are executed at compile time, not at run time, so they are free from the constraints of the Java security manager and can call system functions and read files just like regular Java code. “Since Groovy is built on top of Java, we felt we should be able to write a Groovy annotation that executes at compile time, even though the compiled code is not actually run,” they said. After experimenting with the code, they achieved RCE. “The vulnerability our team discovered follows a familiar pattern in Java: filters designed to restrict authentication often contain easy-to-exploit authentication bypass flaws,” the Searchlight researchers said. “Logical flaws in how Java interprets request URIs are a gift that continues giving when paired with matrix parameters. “Participating in CTFs, or even staying up to date with research in the CTF space, continues to pay dividends, giving us unique insights into how we can often turn a seemingly unexploitable bug into an exploitable one.”

Oracle EBS Victims Climb Past 100

Meanwhile, the number of victims from the CL0P ransomware group’s exploitation of Oracle E-Business Suite vulnerabilities has now climbed past 100 after the threat group claimed additional victims late last week. Mazda and Cox Enterprises are the latest to confirm being breached, bringing the confirmed total to seven so far. Mazda said it was able to contain the breach without system or data impact, but Cox said the personal data of more than 9,000 was exposed.
❌