Business Continuity Mode: Enabled Keeping Coin-Op Gaming & Hospitality Operations Up and Running — No Matter What In the hospitality and entertainment world, every minute of downtime is a missed opportunity. For coin-op arcades, game rooms, and food & beverage restaurants, that downtime...
Blogs
82% of North American Hotels Were Hit by Cyberattacks—Are You Ready?
As summer travel heats up, so does cybercriminal activity targeting the hospitality sector. A recent industry report reveals that a staggering 82% of North American hotels experienced a successful cyberattack during the summer of 2024, with many hit multiple times. As we enter the 2025 travel...
Chinese State Hackers Breach National Guard: A Nine-Month Wake-Up Call for Government and Critical Infrastructure Security
In a sobering reminder of today’s evolving cyber threat landscape, Salt Typhoon, a Chinese state-sponsored threat group, successfully infiltrated a U.S. Army National Guard network—undetected—for nine months in 2024. The attackers quietly exfiltrated network configuration files, administrator...
Massive Data Breach at Allianz Life Tied to Social Engineering Attack
On July 16, 2025, Allianz Life Insurance Company of North America fell victim to a significant cybersecurity incident that has exposed the personally identifiable information (PII) of most of its 1.4 million U.S. customers, financial professionals, and select employees. The breach was the result...
Episource Data Breach Exposes Sensitive Info of Over 5 Million Patients: What Happened and What It Means for You
In yet another major cybersecurity incident shaking the U.S. healthcare sector, Episource, a subsidiary of UnitedHealth Group’s Optum division, has confirmed a significant data breach affecting over 5.4 million individuals. The breach, which involved highly sensitive personal and medical data, is...
AI Tool Impersonations Fuel Surge in Malware and Ransomware Attacks
Fake AI Tools Are the New Trojan Horse: Why SMBs Must Stay Vigilant As artificial intelligence (AI) tools rapidly enter the mainstream of business and marketing workflows, cybercriminals are taking full advantage. Recent threat intelligence highlights a troubling new trend: fake installers for...
Catching the Uncatchable: How Blackswan MDR + Open XDR Stops Advanced Threats Like Fog Ransomware
In today’s cyber threat landscape, it’s not the obvious attacks that slip past defenses—it’s the stealthy ones. The recent Fog ransomware attack, detailed by Symantec, shows just how quietly sophisticated ransomware groups have become. But this kind of multi-stage, tool-heavy campaign is exactly...
CISA’s Executive Guidance: Implementing SIEM and SOAR Platforms
Cyber threats are more frequent, complex, and damaging than ever. To maintain trust and ensure operational continuity, organizational leaders must take proactive steps to detect and respond to these threats. Two technologies increasingly at the heart of modern cybersecurity strategies are Security...
Blackswan CEO, Dr. Mike Saylor, to Present at 2025 TETL (Texas Education Leaders Technology Conference)
🚨 Speaker Spotlight at #TETL2025! 🚨 We’re excited to announce that Dr. Mike Saylor, CEO of Blackswan Cybersecurity, will be presenting at the TETL 2025 Summer Conference — celebrating 20 years of empowering K12 technology leaders! 🎉 🧠 Session Topic: Cybersecurity Technology Optimization📅...
Critical Infrastructure at Risk: Why State and Local Governments Need Proactive Cyber Defense Now
State and local governments are under siege from a rising tide of cyber threats. From ransomware and supply chain compromises to attacks on social services systems and K12 District networks, the public sector has become a prime target for nation-state actors and financially motivated threat...