When every day is threat assessment day

In this Help Net Security interview, Paul J. Mocarski, VP & CISO at Sammons Financial Group, discusses how insurance carriers are adapting their cybersecurity strategies. He explains how ongoing threat assessments, AI-driven automation, and third-party risk management help maintain readiness.…

Phishing Attack Impersonates Travel Brands Using 4,300 Malicious Domains

A Russian-speaking threat actor has orchestrated an extensive phishing campaign that has registered over 4,300 malicious domains targeting travelers since the beginning of 2025. The sophisticated operation customizes phishing pages to impersonate legitimate travel industry giants including Airbnb, Booking.com, Expedia,…

Chinese National Sentenced for Laundering Over £5 Billion from 128,000 Victims

A landmark Metropolitan Police investigation has concluded with the sentencing of two individuals involved in one of the world’s largest cryptocurrency seizures, which recovered over 61,000 Bitcoin, worth approximately £5 billion, from a sophisticated international fraud operation. A seven-year investigation…

An Overview of Qualified Digital Certificates

Explore qualified digital certificates, their role in authentication, and how they bolster security in software development. Understand the technical and legal aspects. The post An Overview of Qualified Digital Certificates appeared first on Security Boulevard. This article has been indexed…