Friday, March 13, 2026

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
    • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

CSV

Spyware, whatsapp, Apple. Google, Microsoft

Spyware Makers Topped Google’s List of Zero-Day Exploits for the First Time in 2025

Jeffrey Burt | March 6, 2026 | china, CSV, Google TAG, GTIG, Intellexa, Microsoft, nation-state actors, North Korea, NSO Group, Pegasus Spyware, Trend Micro, zero-day attack
For the first time, spyware makers topped Google's list of organizations that exploited zero-day flaws in 2025, overtaking nation-state actors from China, Russia, and elsewhere and continuing a trends that Google researchers ...
Security Boulevard

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

The New Reality of Open Source Risk: 2026 OSSRA Findings
Why Traditional Security Fails the FinServ Speed Test
Next-Gen DSPM for the AI-Driven Enterprise
Run and Scale Agentic AI Applications in Production
Closing the Cloud Security Gap With Runtime Protection

Podcast

Listen to all of our podcasts

Secure by Design

1 day ago | Jack Poller

83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse

1 day ago | Jack Poller

The White House Got the Cyber Strategy Right — By Knowing What Not to Do

4 days ago | Jack Poller

Meta’s AI Safety Chief Couldn’t Stop Her Own Agent. What Makes You Think You Can Stop Yours?

3 weeks ago | Jack Poller

Anthropic Didn’t Kill Cybersecurity. It Just Reminded Us There Are Two Doors

3 weeks ago | Jack Poller

The Chicken Littles of Silicon Valley: Why AI Doomsayers Are Repeating History’s Greatest Mistake

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

Most Read on the Boulevard

OpenAI Acquires Security Startup Promptfoo to Fortify AI Agents
Meta’s AI Safety Chief Couldn’t Stop Her Own Agent. What Makes You Think You Can Stop Yours?
Pro-Iranian Hacktivists Join Nation-State Groups in Targeting U.S., Israel, Others
Report Surfaces Higher Correlation Between API and AI Security
Phishing Scammers Impersonating City, County Officials, Demanding Payment: FBI
Granular Policy Enforcement in Quantum Secure Discovery Services
​​How Chinese Hackers Reached America’s Surveillance Infrastructure
Beyond Prompt Injection: The Hidden AI Security Threats in Machine Learning Platforms
Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
What is the Salesforce GraphQL Exploit and What You Should Do

Industry Spotlight

The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security
Featured Industry Spotlight Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Uncategorized 

The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security

February 18, 2026 Jack Poller | Feb 18 0
Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Use of XMRig Cryptominer by Threat Actors Expanding: Expel

January 9, 2026 Jeffrey Burt | Jan 09 Comments Off on Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Malware Campaign Abuses Booking.com Against Hospitality Sector
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight 

Malware Campaign Abuses Booking.com Against Hospitality Sector

January 5, 2026 Jeffrey Burt | Jan 05 Comments Off on Malware Campaign Abuses Booking.com Against Hospitality Sector

Top Stories

83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse

March 12, 2026 Jack Poller | Yesterday 0
The White House Got the Cyber Strategy Right — By Knowing What Not to Do
Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

The White House Got the Cyber Strategy Right — By Knowing What Not to Do

March 12, 2026 Jack Poller | Yesterday 0
Europe’s Sovereign Search Plan is Really a Security Strategy
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Europe’s Sovereign Search Plan is Really a Security Strategy

March 12, 2026 Alan Shimel | Yesterday 0

Download Free eBook

[su_panel border="0px solid #ddd" radius="0" text_align="center" padding-top="0px" padding-bottom="0px"]
7 Must-Read eBooks for Security Professionals
[/su_panel]

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2026 Techstrong Group Inc. All rights reserved.
Image
×

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.
      Advertisement