Category: Security Boulevard

How can Agentic AI improve digital security processes

What Role Does Agentic AI Play in Enhancing Digital Security Processes? The question of digital security is more pertinent than ever before. Where Non-Human Identities (NHIs) are consistently growing, how can organizations ensure their security processes are up to speed?…

How smart are NHIs in managing complex security environments

How Do Non-Human Identities (NHIs) Enhance Security in Complex Digital Environments? Have you ever considered how machine identities, known as Non-Human Identities (NHIs), revolutionize cybersecurity? Understanding and managing NHIs can be critical in safeguarding complex security environments. From finance to…

Does implementing Agentic AI fit the budget of SMBs

Can Non-Human Identities Bridge the Security Gap in Your Organization? Where machine-to-machine communication is essential, do you ever wonder how secure your organization’s machine identities really are? The management of Non-Human Identities (NHIs) plays a crucial role in addressing this…

Can Agentic AI effectively handle enterprise security needs

Are Non-Human Identities the Key to Strengthening Enterprise Security? How can organizations ensure a robust enterprise security framework that effectively handles their unique needs? The answer may be in strategic management of Non-Human Identities (NHIs). These machine-generated identities, often paired…

How AI Agents Automate CVE Vulnerability Research

The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built on Google’s Agent Development Kit (ADK), it coordinates specialized AI models through four phases — deep research, technology reconnaissance, actor-critic template…

Emulating the Systematic LokiLocker Ransomware

AttackIQ has released a new attack graph that emulates the behaviors of LokiLocker ransomware, a .NET based strain active since at least mid-August 2021. The malware combines defense evasion and impact techniques, including disabling Task Manager and Windows Firewall, as…

Early 2026 is Proving KasadaIQ’s AI Predictions

AI agents have moved from experimental to operational. Now security teams must verify agent identity, intent, and trust before automation becomes exploitation. The post Early 2026 is Proving KasadaIQ’s AI Predictions appeared first on Security Boulevard. This article has been…

NDSS 2025 – Translating C To Rust: Lessons From A User Study

Session 13D: Software Security: Code and Compiler Authors, Creators & Presenters: Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li (National University of Singapore), Prateek Saxena (National University of Singapore), Ashish Kundu (Cisco Research) PAPER…

APT37 Adds New Capabilities for Air-Gapped Networks

IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign, tracked as Ruby Jumper by ThreatLabz, APT37 uses Windows shortcut (LNK) files…

What to Know About the Notepad++ Supply-Chain Attack

The cybersecurity community is still grappling with a sobering realization: one of the most ubiquitous tools in the developer’s toolkit, Notepad++, was hiding a critical vulnerability for over six months. The post What to Know About the Notepad++ Supply-Chain Attack…

What is Polymorphic Malware?

Malware continues to evolve, becoming more sophisticated and harder to detect. One of the most challenging types is polymorphic malware — malicious software that constantly changes its code to evade detection by traditional security systems. In a world where cyber…