Teri Robinson From the time she was 10 years old and her father gave her an electric typewriter for Christmas, Teri Robinson knew she wanted to be a writer. What she didn’t know is how the path from graduate school at LSU, where she earned a Masters degree in Journalism, would lead her on a decades-long journey from her native Louisiana to Washington, D.C. and eventually to New York City where she established a thriving practice as a writer, editor, content specialist and consultant, covering cybersecurity, business and technology, finance, regulatory, policy and customer service, among other topics; contributed to a book on the first year of motherhood; penned award-winning screenplays; and filmed a series of short movies. Most recently, as the executive editor of SC Media, Teri helped transform a 30-year-old, well-respected brand into a digital powerhouse that delivers thought leadership, high-impact journalism and the most relevant, actionable information to an audience of cybersecurity professionals, policymakers and practitioners.

Teri Robinson

The Rise of QR Codes Spurs Rise in ‘Fresh Phish’
Miscreants have ramped up their use of QR codes to phish for credentials, according to INKY threat researchers ... Read More
Security Boulevard

Russia Expected to Increase Critical Infrastructure Attacks
Russia’s war strategy increasingly involves cybersecurity, with the country expected to ramp up attacks on critical infrastructure in Ukraine and countries that are members of NATO, according to Switzerland’s Federal Intelligence Service (FIS). “The war in Ukraine represents a threat with partially global implications for critical infrastructure. Critical infrastructure outside ... Read More
Security Boulevard

Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln
There is no workaround or patch for a high-severity vulnerability—and none will be forthcoming—in Cisco’s Nexus 9000 series switches ... Read More
Security Boulevard

Lockbit 3.0 Claims Credit for Ransomware Attack on Japanese Port
After a ransomware attack shuttered operations at container terminals at the Port of Nagoya in Japan, the Lockbit 3.0 ransomware gang claimed responsibility and demanded the port pay up. The attack on the port, which is responsible for 10% of the country’s cargo trade and is used by companies like ... Read More
Security Boulevard

Third Party Lets Pepsi Data Out of the Bottle, PII Nicked
Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ... Read More
Security Boulevard

As Goes GDPR, So Goes AI: EU Leads With Proposed AI Law
The EU has proposed legislation that would govern the use of AI and could be used for a blueprint by other countries looking to put guardrails around the technology ... Read More
Security Boulevard

CISA Pressures Federal Civilian Agencies to Secure Network Devices
Teri Robinson | | binding operational directive, cisa, Cyberlaw, Data breach, legislation, regulations
CISA put federal civilian agencies on notice that they were expected to secure network devices within 14 days of discovering they had been exposed on the internet ... Read More
Security Boulevard

Malware Devs Update Legion Hacktool, Boost Capabilities
A recently discovered cloud-focused malware tool has seemingly been updated with additional functionality ... Read More
Security Boulevard

PharMerica Breach: The Lure of Health Care Data
Two months after noticing suspicious activity in its systems, PharMerica disclosed that nearly six million patients had their health care data stolen by threat actors. The large pharmacy services company, which has more than 2,500 locations in the U.S., filed a data breach notification in May 2023. PharMerica noted that ... Read More
Security Boulevard

ChatGPT Spreads Malicious Packages in AI Package Hallucination Attack
A newly discovered ChatGPT-based attack technique, dubbed AI package hallucination, lets attackers publish their own malicious packages in place of an unpublished package. In this way, attackers can execute supply chain attacks through the deployment of malicious libraries to known repositories. The technique plays off of the fact that generative ... Read More
Security Boulevard