Monday, February 2, 2026

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
    • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

python

Arcjet Python SDK Sinks Teeth Into Application-Layer Security 

Arcjet Python SDK Sinks Teeth Into Application-Layer Security 

Adrian Bridgwater | January 15, 2026 | API security, Application Security, Cloud Security, data protection, IT Security and Data Protection, Phishing, python
A new Arcjet SDK lets Python teams embed bot protection, rate limiting, and abuse prevention directly into application code ...
Security Boulevard
Text Detection and Extraction From Images Using OCR in Python

Text Detection and Extraction From Images Using OCR in Python

SSOJet - Enterprise SSO & Identity Solutions | October 13, 2025 | Automation, Image Processing, OCR, python, Python OCR
Learn how to detect and extract text from images and scanned files using Python and OCR. Step-by-step guide for developers and automation enthusiasts ...
SSOJet - Enterprise SSO & Identity Solutions

Insights from the DeepSeek Malicious Software Package Incident: Why Software Supply Chain Security Matters in Global AI Technology Competition

NSFOCUS | February 11, 2025 | AI, AI data, AI Security, api, artificial intelligentce, ATT&CK, Blog, China AI, DeepSeek, NSFOCUS, python, supply chain
Background With the widespread application of AI technology, software supply chains are facing more complex and diverse security threats. Since January 2025, DeepSeek, as an emerging force in China’s AI industry, has ...
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
A black OpenWrt hoodie

Critical OpenWrt Bug: Update Your Gear!

Richi Jennings | December 10, 2024 | Automatic Update, automatic updates, CVE-2024-54143, IoT firmware, Malicious Firmware Updates, OpenWrt, python, RyotaK, SB Blogwatch
ASU 48-bit trash hash: Open source router firmware project fixes dusty old code ...
Security Boulevard
email, attacks, Google Yahoo spam Proofpoint spoofed phishing

Defending Against Email Attachment Scams

Gaurav Mittal | December 4, 2024 | aws, Email Attachment Security, Pyminizip, python, Signed URL
One of the most alarming methods of attack involves intercepting email attachments during transit, resulting in the theft of personally identifiable information (PII) and other sensitive data ...
Security Boulevard

OpenSSH regreSSHion Vulnerability

David Michael Berry | July 3, 2024 | CVE-2024-6387, Cybersecurity, David Michael Berry, Linux, Nmap, python, security, technology, Uncategorized, vulnerability
…and…How AI Can Revolutionize Code and Regression Testing Introduction Artificial Intelligence (AI) is transforming numerous industries, and software development is no exception. One of the critical areas where AI can make a ...
Berry Networks
code inspection.

Malicious PyPI Package ‘Pytoileur’ Targets Windows and Leverages Stack Overflow for Distribution

Steven J. Vaughan-Nichols | May 29, 2024 | Malware, PyPI, python, Sonatype, windows malware
Another day, another PyPI malware package. But this one has a new way to (try to) sneak into your computer ...
Security Boulevard
PyPI crypto-stealer targets Windows users, revives malware campaign

PyPI crypto-stealer targets Windows users, revives malware campaign

Ax Sharma | May 29, 2024 | FEATURED, Malware Analysis, Nexus Firewall, PyPI, python, Sonatype Repository Firewall, Vulnerabilities
Sonatype has discovered 'pytoileur', a malicious PyPI package hiding code that downloads and installs trojanized Windows binaries capable of surveillance, achieving persistence, and crypto-theft. Our discovery of the malware led us to ...
2024 Sonatype Blog
Closeup of person going “Shhh!”

PyPI Goes Quiet After Huge Malware Attack: 500+ Typosquat Fakes Found

Richi Jennings | March 29, 2024 | code reuse, open source software supply chain security, PyPI, PyPI malicious packages, pypi vuln, pypi vulnerability, python, Python Malware, Python Packages, Python vulnerability, SB Blogwatch, secure software supply chain, software supply chain, software supply chain attack, software supply chain attacks, software supply chain hygiene, Software supply chain management, software supply chain risk, Software Supply Chain risks, software supply chain security, Software Supply Chain Security Risks, Software Supply Chain Security Weaknesses, typosquat, Typosquatting, typosquatting attacks
Emergency stop button: The Python Package Index was drowning in malicious code again, so they had to shut down registration for cleanup ...
Security Boulevard
apps, data, smishing, attack, mobile, devices, phishing, smishing USPS scam

With SNS Sender, USPS Smishing Scams Move to the Cloud

Jeffrey Burt | February 16, 2024 | aws, Cloud computing security, python, smishing attacks
Given how many organizations continue to move their workloads to the cloud, it’s not surprising that bad actors are doing the same. The latest example comes from attackers who are using Amazon ...
Security Boulevard
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

Closing the Cloud Security Gap With Runtime Protection
Zero Trust for Agentic AI: Managing Non‑Human Identities at Scale
The Prescriptive Path to AI Security: From Chaos to Scalable Governance
From SIEM to Lakehouse: A Practical Path to SOC Modernization with Databricks & Anvilogic
Autonomous IT: Transforming Operations and Security in Real Time with AI

Podcast

Listen to all of our podcasts

Secure by Design

3 weeks ago | Jack Poller

All Aboard the Zero-Trust Train

3 weeks ago | Jack Poller

We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster

2 months ago | Jack Poller

Can a Transparent Piece of Plastic Win the Invisible War on Your Identity?

2 months ago | Jack Poller

Gartner’s AI Browser Ban: Rearranging Deck Chairs on the Titanic

2 months ago | Jack Poller

The Death of Legacy MFA and What Must Rise in Its Place

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

Most Read on the Boulevard

Report: Open Source Malware Instances Increased 73% in 2025
A Lack of Spending Isn’t the Problem With Cloud Security, Structural Complexity Is 
MIND Extends DLP Reach to AI Agents
Flaw in Broadcom Wi-Fi Chipsets Illuminates Importance of Wireless Dependability and Business Continuity 
StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces
Top 6 Data Breaches of January 2026
10 Best B2B Fintech SSO Solutions in 2026
The Great Shift: Cybersecurity Predictions for 2026 and the New Era of Threat Intelligence
How is Agentic AI changing healthcare security
Blockchain Penetration Testing: Definition, Process, and Tools

Industry Spotlight

Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Use of XMRig Cryptominer by Threat Actors Expanding: Expel

January 9, 2026 Jeffrey Burt | Jan 09 0
Malware Campaign Abuses Booking.com Against Hospitality Sector
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight 

Malware Campaign Abuses Booking.com Against Hospitality Sector

January 5, 2026 Jeffrey Burt | Jan 05 0
Google Chrome Extension is Intercepting Millions of Users’ AI Chats
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Google Chrome Extension is Intercepting Millions of Users’ AI Chats

December 17, 2025 Jeffrey Burt | Dec 17 Comments Off on Google Chrome Extension is Intercepting Millions of Users’ AI Chats

Top Stories

Fast-Growing Chinese Crime Networks Launder 20% of Illicit Crypto: Chainalysis
Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

Fast-Growing Chinese Crime Networks Launder 20% of Illicit Crypto: Chainalysis

February 2, 2026 Jeffrey Burt | Yesterday 0
ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data

February 2, 2026 Jeffrey Burt | Yesterday 0
StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces

February 2, 2026 Adrian Bridgwater | Yesterday 0

Download Free eBook

[su_panel border="0px solid #ddd" radius="0" text_align="center" padding-top="0px" padding-bottom="0px"]
The State of Cloud Native Security 2020
[/su_panel]

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2026 Techstrong Group Inc. All rights reserved.
Image
×

Exploring Trends in Mainframe Application Modernization

Step 1 of 8

12%
What is your organization’s primary approach to modernizing mainframe applications?(Required)
Does your organization currently have an application modernization initiative in place?(Required)
What TWO factors MOST OFTEN drive your organization’s decisions to modernize specific mainframe modules? (Select up to 2 responses)(Required)
What strategies does your organization use for mainframe code transformation?(Required)
What is your organization's strategic direction for mainframe applications over the next 3-5 years?(Required)

What factors MOST influence your organization's platform decisions for mainframe applications? (Select up to 2 responses)(Required)
What are the TOP TWO benefits your organization expects from mainframe modernization? (Select up to 2 responses)(Required)
How effective have AI-powered tools for code conversion been in your modernization efforts?(Required)

×

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.
      Advertisement