• Pentesting
  • Ransomware
  • Cybersecurity
  • Compliance
  • Disaster Recovery

469-557-2007

  • Home
  • Work
    • Financial Sector
    • Manufacturing Sector
    • Professional Services
    • State and Federal
    • Energy Sector
    • Nonprofit
    • Healthcare
    • Education
  • About Us
    • Story
    • Values
    • Mastery
    • Our Process
    • Leadership
    • MSSP
  • Services
    • MSSP Services
    • vCISO Services
    • Compliance
    • Consulting
    • Disaster Recovery
  • Resources
    • Insight
    • Reports
    • Newsletter
  • Contact Us
    • Contact Us
    • Client Portal

BlackSuit ransomware stole data of 950,000 from software vendor

by admin | Aug 27, 2024 | Uncategorized

Young Consulting is sending data breach notifications to 954,177 people who had their information exposed in a BlackSuit ransomware attack on April 10, 2024. […]

US Marshals Service disputes ransomware gang’s breach claims

by admin | Aug 27, 2024 | Uncategorized

The U.S. Marshals Service (USMS) denies its systems were breached by the Hunters International ransomware gang after being listed as a new victim on the cybercrime group’s leak site on Monday. […]

Windows 11 KB5041587 update adds sharing to Android devices

by admin | Aug 27, 2024 | Uncategorized

Microsoft has released the optional KB5041587 preview cumulative update for Windows 11 23H2 and 22H2, which adds sharing to Android devices and fixes multiple File Explorer issues. […]

Notion exits Russia and will terminate accounts in September

by admin | Aug 27, 2024 | Uncategorized

Notion has announced it will exit the Russian market and is terminating all workspaces and accounts identified linked to users in the country. […]

Malware infiltrates Pidgin messenger’s official plugin repository

by admin | Aug 27, 2024 | Uncategorized

The Pidgin messaging app removed the ScreenShareOTR plugin from its official third-party plugin list after it was discovered that it was used to install keyloggers, information stealers, and malware commonly used to gain initial access to corporate networks....

Recent Posts

  • Why Hackers Can’t Quit the Cloud: Unpacking the 15 Tbps Azure DDoS Attack and Its Ominous Implications
  • Prompt Injection: How AI Models Are Being Tricked into Self-Sabotage
  • Cisco DoS Attacks: What You Need to Know About Vulnerabilities in Firewalls and Routers.
  • They Are Coming for the AI Agents
  • Linux Ransomware: Hackers Are Increasingly Targeting Linux, Not Just Windows

Recent Comments

No comments to show.

Contact Us



469-557-2007



18111 Preston Rd. Suite 800 Dallas, TX 75252



 info@blackbeltsecure.com

Get Started

Do you have time to wait for the next security breach?  Let’s talk now. 

Book Appointment

The cybersecurity crisis is impacting every industry across the nation.  Find out how to protect yourself and your business now.

Free Report

Black Belt Secure



18111 Preston Rd. Suite #880
Dallas, TX 75252



469-557-2007



info@blackbeltsecure.com

Who We Are

We are a national award-winning MSSP (Managed Security Services Provider) serving North Texas and beyond.

Quick Links

vCISO Services
Jutsu
MSSP Services
Auditing
Compliance
Dark Web
Working with Us
Who We work With
Career Opportunities
FAQ

Latest Blog Articles

Why Hackers Can’t Quit the Cloud: Unpacking the 15 Tbps Azure DDoS Attack and Its Ominous Implications

Why Hackers Can’t Quit the Cloud: Unpacking the 15 Tbps Azure DDoS Attack and Its Ominous Implications

Nov 19, 2025

In the ever-escalating arms race of cybersecurity, the 15 Tbps Azure DDoS attack in October 2025 turned the cloud into a full-fledged battleground. This record-breaking assault, measuring 15.72 terabits per second (Tbps) and nearly 3.64 billion packets per second, was...

Prompt Injection: How AI Models Are Being Tricked into Self-Sabotage

Prompt Injection: How AI Models Are Being Tricked into Self-Sabotage

Nov 14, 2025

As prompt injection becomes a defining vulnerability in artificial intelligence, the very tools designed to enhance productivity—from customer service bots to internal decision-making systems—are now prime targets for exploitation. A groundbreaking 2024 study by...

© Copyright 2025 Black Belt Secure

  • Follow
  • Follow
  • Follow
  • Follow