Author, Creator & Presenter: Jenny Guanni Qu, AI Researcher At Pebblebed Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026 –…
Category: Security Boulevard
FlowCarp Identifies Protocols
I am thrilled to announce the release of a brand new tool called FlowCarp! FlowCarp is a simple command line tool that performs a very complicated task. It identifies the application layer protocol in network traffic without relying on port…
Ten Great Cybersecurity Job Opportunities
Security Boulevard is now providing a weekly cybersecurity jobs report through which opportunities for cybersecurity professionals will be highlighted as part of an effort to better serve our audience. Our goal in these challenging economic times is to make it…
EasyDMARC and KnowBe4 Partner to Advance Proactive Email Security as Phishing Fuels More Than One-Third of Cyberattacks
Originally published at EasyDMARC and KnowBe4 Partner to Advance Proactive Email Security as Phishing Fuels More Than One-Third of Cyberattacks by Anush Yolyan. Dover, Delaware and Tampa Bay, Florida | May … The post EasyDMARC and KnowBe4 Partner to Advance…
Local Guardrails for Secrets Security in the Age of AI Coding Assistants
Modern developer environments expose sensitive context across files, prompts, logs, and commands. Learn how layered local controls reduce secrets risk. The post Local Guardrails for Secrets Security in the Age of AI Coding Assistants appeared first on Security Boulevard. This…
CAF Objectives Overview for UK SMEs: A Practical Guide to the NCSC Cyber Assessment Framework
CAF Objectives Overview for UK SMEs: A Practical Guide to the NCSC Cyber Assessment Framework If you are a UK SME, the NCSC Cyber Assessment Framework, usually shortened to CAF, can look more formal than it needs to be. In…
ShinyHunters Claims Responsibility for Breach of EdTech Company Instructure
The prolific extortion group ShinyHunters claimed responsibility for the breach of Edtech vendor Instructure’s systems, stealing 3.65 TB of sensitive information, including names, email addresses, and messages of students, teachers, and others. ShinyHunters also reportedly behind an early attack of…
The Half of Agent Security You’re Not Governing
The governance of AI agents faces a fundamental asymmetry: while MCP servers provide structured logs, the “Skills” that drive agent reasoning remain forensic black holes. As high-risk capabilities—such as arbitrary code execution and state changes—become prevalent in nearly 60% of…
Handling User Documents Securely in Authentication and Onboarding Systems
Learn how to securely handle user documents in authentication and onboarding systems to protect data, ensure compliance, and prevent breaches. The post Handling User Documents Securely in Authentication and Onboarding Systems appeared first on Security Boulevard. This article has been…
AI for Security Infrastructure: Rebalancing Cybersecurity for the Decade Ahead
An exploration of the shift from reactive “assume breach” mentalities to AI-driven prevention, highlighting how Domain-Specific Language Models (DSLMs) empower security architects to eliminate configuration drift and tool sprawl. The post AI for Security Infrastructure: Rebalancing Cybersecurity for the Decade Ahead …
Frameworks Don’t Build Trust. Adoption Does
As AI evolves toward autonomy, the Cloud Security Alliance is launching the STAR for AI Catastrophic Risk Annex to codify auditable controls for agentic systems The post Frameworks Don’t Build Trust. Adoption Does appeared first on Security Boulevard. This article…
A week in security (April 27 – May 3)
A list of topics we covered in the week of April 27 to May 3 of 2026 The post A week in security (April 27 – May 3) appeared first on Security Boulevard. This article has been indexed from Security…
True Threats and True Crimes – Those Memes You Post Might Be Crimes
Does reposting a “86 47” meme constitute a criminal threat? Analyzing the James Comey indictment through the lens of Counterman v. Colorado and Elonis v. United States. The post True Threats and True Crimes – Those Memes You Post Might…
Identity Risk Intelligence vs Threat Intelligence: What’s the Difference?
Introduction: Two terms, one growing confusion In cybersecurity conversations today, two terms are showing up more frequently: Threat Intelligence Identity Risk Intelligence At a glance, they sound similar. Both deal with data, risk, and security insights. But they solve fundamentally…
[un]prompted 2026 – The Parseltongue Protocol: Textual Obfuscation Methods
Author, Creator & Presenter: Joey Melo, AI Red Teaming Specialist At CrowdStrike Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink The post [un]prompted 2026…
Securing AI procurement and third-party models: a practical guide for UK SMEs
Securing AI procurement and third-party models: a practical guide for UK SMEs Third-party AI tools can be useful, but they also change the way your business handles data, makes decisions, and depends on suppliers. For many UK SMEs, the risk…
PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers
PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers The post PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers appeared first on Security Boulevard. This article has…
A Tale of Two States: The 2026 Cybersecurity Paradox
The cyber threat outlooks from CIOs and CISOs at the NASCIO Midyear Conference in Philadelphia ranged from the good to the bad to the ugly — with AI front and center. The post A Tale of Two States: The 2026…
FBI Links Cybercriminals to Sharp Surge in Cargo Theft Attacks
What happened The FBI issued a public service announcement on April 30, 2026, warning the US transportation and logistics industry of a sharp rise in cyber-enabled cargo theft, with estimated losses in the United States and Canada reaching nearly $725…
ConsentFix v3 Automates OAuth Abuse to Bypass MFA and Hijack Azure Accounts
What happened A third iteration of the ConsentFix attack technique has been circulating on hacker forums, introducing automation and scalability to a method that abuses Microsoft Azure’s OAuth2 authorization code flow to hijack accounts without passwords and despite multi-factor authentication…