A new ransomware group called FunkSec claimed 85 victims in December but its members appear to be lesser-skilled hackers using generative AI and inflated attack numbers to bolster their capabilities and reputation, according to Check Point researchers. The post FunkSec:…
Category: Security Boulevard
HHS Proposes Major Overhaul of HIPAA Security Rule in the Wake of Change Healthcare Breach
The new rules come in the wake of the Change Healthcare breach, which exposed the electronic personal health information of about 100 million Americans. The post HHS Proposes Major Overhaul of HIPAA Security Rule in the Wake of Change Healthcare…
How to create realistic, safe, document-based test data for MongoDB
Safely generating NoSQL test data designed to mirror existing document collections entails significant challenges when data privacy and data utility are at stake. Here’s what you need to know to successfully de-identify and synthesize your data in MongoDB. The post…
How to create realistic test data for Databricks with Tonic
Learn how to create realistic test data for Databricks with Tonic’s latest integration! Yes, you read that right: We’re the only data masking and synthesis platform to offer a native streamlined Databricks integration. The post How to create realistic test data…
How to generate safe, useful test data for Amazon Redshift
Amazon Redshift enables massive data warehousing capabilities, but creating quality mock data designed to mimic data stored in Redshift comes with significant challenges. Here are the problems involved and tools you need to tackle each with expertise. The post How…
What is Breach Readiness?
While many organizations devote countless resources to stopping attacks at the perimeter, today’s threat landscape calls for a different mindset. The concept of breach readiness begins with acknowledging the likelihood of an incident, then building robust methods to contain and…
Botnet Threat Update July to December 2024
Overall botnet command control (C&C) activity decreased marginally by -4% between July and December last year. China dominated the Top 20 charts with increased botnet C&C activity across domain registrars and networks, ranking #1 globally for hosting botnet C&C servers.…
Privacy Roundup: Week 2 of Year 2025
This is a news item roundup of privacy or privacy-related news items for 5 JAN 2025 – 11 JAN 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here…
How to Capitalize on 5 Trends Shaping the Future of Pentesting
Continuous testing is a major contributor to cybersecurity that’s so advanced, integrated and proactive that it doesn’t just prevent an attack but wards off attackers altogether. The post How to Capitalize on 5 Trends Shaping the Future of Pentesting appeared…
How Your Digital Footprint Fuels Cyberattacks — and What to Do About It
Where you live, where you jog, what your pet’s name is and which email address you use the most is no longer a secret to cybercriminals. Hackers are exploiting the digital breadcrumbs — your personally identifiable information (PII) — that…
AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude
Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, comparing how each AI engine handles your personal…
The Vanity Press in Academia
I’ve never been a regular resident of the ivory halls of academia, but Mich Kabay recently made me aware of an article about legitimate scientific journals driven to distraction by being flooded with commentary apparently reflecting a surge in the…
DEF CON 32 – Open Source Hacker V. Government Lawyer
Authors/Presenters: Rebecca Lively, Eddie Zaneski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.…
What is PCI DSS 4.0: Is This Still Applicable For 2024?
In a time when cyber threats continuously evolve, a security standard or framework is essential for protecting digital assets. The Payment Card Industry Data Security Standard (PCI DSS), developed by the PCI Security Standards Council, empowers organisations to safeguard cardholder…
PCI DSS Requirements With v4.0.1 Updates For 2024
PCI DSS refers to the Payment Card Industry Data Security Standard created by the PCI Security Standards Council (PCI SSC), an independent entity founded by major payment card brands, including Visa, JCB International, MasterCard, American Express, and Discover. PCI DSS…
Advancements in Machine Identity Protections
The Strategic Importance of Non-Human Identities Are we taking the necessary steps to secure our machine identities, or are we leaving our systems exposed to potential attackers? Non-Human Identities (NHIs) play a critical role in maintaining secure cloud environments. In…
DEF CON 32 – Porn & Privacy – ET
Author/Presenter: ET Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post…
2025 SaaS Security Word of the Year: Adaptability | Grip
Discover why adaptability is the 2025 SaaS security word of the year. This is the year to address shadow SaaS, AI risks, and evolving cyber threats effectively! The post 2025 SaaS Security Word of the Year: Adaptability | Grip appeared…
The Cost of Complacency in Credential Hygiene
The PowerSchool breach highlights the risks of poor credential hygiene. This article covers proactive steps to protect your SaaS environment. The post The Cost of Complacency in Credential Hygiene appeared first on Security Boulevard. This article has been indexed from…
Below the Surface Winter 2024 Edition – The Year in Review
The Year of the Typhoon Highlights from this edition: The post Below the Surface Winter 2024 Edition – The Year in Review appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post Below the Surface Winter…