Category: Security Boulevard

BTS #39 – The Art of Firmware Scraping – Edwin Shuttleworth

In this episode, Edwin Shuttleworth from Finite State discusses firmware security, insights from the GRRCON Security Conference, and the challenges of firmware analysis. The conversation covers various topics, including firmware scraping techniques, the IoT landscape, types of firmware, the importance…

Randall Munroe’s XKCD ‘University Commas’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2995/” rel=”noopener” target=”_blank”> <img alt=”” height=”273″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/250b6bb7-deef-4348-bb98-73a095475a9c/university_commas.png?format=1000w” width=”580″ /> </a><figcaption class=”image-caption-wrapper”> via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘University Commas’ appeared first on Security…

Cloud Security Assessment: Checklist to Ensure Data Protection

The adoption of cloud computing has become a cornerstone of modern business operations today. However, this shift brings forth significant concerns about data protection and security. Cloud security assessment plays a crucial role in safeguarding sensitive information and ensuring compliance…

Do More With Your SOAR

Running any Security Operations Center (SOC) is complex, and running without the best tools to automate as much as possible makes it even more difficult. File enrichment is one of the best ways to augment your hard-working SOC operators —…

Indian Threat Actors Target South And East Asian Entities

Recent reports have revealed that Indian threat actors are using multiple cloud service providers for malicious purposes. The hacker activities are mainly centered around facilitating credential harvesting, malware delivery, and command-and-control (C2). In this article, we’ll cover who the Indian…

A Modern Playbook for Ransomware

SOC teams need every advantage against ransomware. Learn how a SOAR playbook can streamline incident response, saving time and minimizing the impact of attacks. The post A Modern Playbook for Ransomware appeared first on D3 Security. The post A Modern…

The Past Month in Stolen Data

Infostealers, Data Breaches, and Credential Stuffing Unquestionably, infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well). Access brokers are buying, selling, trading, collecting, packaging, and distributing the raw…

Tips for Cybersecurity Awareness Month

As the threat landscape continues to evolve, businesses must understand the specific cybersecurity risks they face and take proactive measures to protect themselves. One of the most significant challenges in cybersecurity is the increasing diversity of threats and the need…

Akamai Embeds API Security Connector in CDN Platform

Akamai Technologies has made available at no extra cost a connector that makes it simpler for cybersecurity teams to discover application programming interfaces (APIs) that organizations have exposed via its content delivery network (CDN). The post Akamai Embeds API Security…

Critical Skills Gap in AI, Cloud Security

There is a growing disconnect between the increasing sophistication of cybersecurity threats and the preparedness of IT teams to combat them, according to an O’Reilly study of more than 1300 IT professionals. The post Critical Skills Gap in AI, Cloud…