Category: Security Boulevard

Anthropic Outlines Bad Actors Abuse Its Claude AI Models

Anthropic shows how bad actors are using its Claude AI models for a range of campaigns that include influence-as-a-service, credential stuffing, and recruitment scams and becomes the latest AI company to push back at threat groups using their tools for…

Wallarm Extends API Security Reach to AI Agents

Wallarm at the 2025 RSA Conference announced that, starting this summer, it will extend the reach of its platform for securing application programming interfaces (APIs) to include artificial intelligence (AI) agents. Tim Erlin, vice president of product for Wallarm, said…

The API Imperative: Securing Agentic AI and Beyond

We recently released The Rise of Agentic AI, our API ThreatStats report for Q1 2025, finding that evolving API threats are fueled by the rise of agentic AI systems, growing complexity in cloud-native infrastructure, and a surge in software supply chain…

‘Slopsquatting’ and Other New GenAI Cybersecurity Threats

As generative artificial intelligence develops, new terms and emerging threats are grabbing headlines regarding cyber threats to enterprises. The post ‘Slopsquatting’ and Other New GenAI Cybersecurity Threats appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Google Cloud Enhances Databases with Firestore and MongoDB Features

Discover Google’s Firestore with MongoDB compatibility, enhancing cloud database functionality with serverless architecture. Explore the future of data storage. The post Google Cloud Enhances Databases with Firestore and MongoDB Features appeared first on Security Boulevard. This article has been indexed…

Creating Impenetrable Cloud Compliance Practices

Are Your Cloud Compliance Practices Truly Impenetrable? Non-Human Identities (NHIs) and Secrets Management have emerged as critical components of an effective cybersecurity strategy. These effectively address the security gaps that often exist between the security and R&D teams within an…

Delivering Value with Advanced IAM

Why is Advanced Identity and Access Management Necessary? Have you ever imagined the chaos that would ensue if all the people in a bustling city, for instance, Los Angeles or New York, swapped their identities suddenly? A similar scenario might…

Optimistic About Your Cybersecurity Strategy?

Why should Cybersecurity Strategy Spark Optimism? Why is there a growing wave of optimism surrounding cybersecurity strategies, especially with the increasing incidence of cyber threats? The answer lies in the revolutionary approach of Non-Human Identities (NHIs) and Secrets Security Management.…

Are You Capable of Managing NHIDs Efficiently?

Are You Understanding the Complexities of Managing NHIDs? When it comes to reinforcing cybersecurity, how confident are you in providing adequate protection for your Non-Human Identities (NHIs)? Are you familiar with the mechanisms that drive efficient identity management, specifically focusing…

New geolocus-cli For ONYPHE’s Geolocus Database

ONYPHE has made available a free API and free MMDB download of their new Geolocus database. It provided IP address metadata in the form of: { “abuse”: [ “amzn-noc-contact@amazon.com”, “aws-routing-poc@amazon.com”, “aws-rpki-routing-poc@amazon.com”, “trustandsafety@support.aws.com” ], “asn”: “AS14618”, “continent”: “NA”, “continentname”: “North America”,…