Category: Security Boulevard

AI Could Help Resolve IT/OT Integration Security Challenges

Security issues stemming from the integration of information technology (IT) and operational technology (OT), could be addressed through artificial intelligence (AI), although the technology could also be leveraged by malicious actors, according to a Cisco study. The post AI Could…

More Than Two Million Stolen VPN Passwords Discovered

More than 2.1 million stolen VPN passwords have been compromised by malware in the past year, highlighting a growing risk for unauthorized access to secure networks, according to a Specops Software report. The post More Than Two Million Stolen VPN…

Exploding pagers and the new face of asset-centric warfare

Attacks on critical infrastructure  The explosion of the Soviet gas pipeline in 1982 was one of the first well-known instances of critical infrastructure being targeted through a software modification that contained a hidden malfunction. In this instance, the Soviets were…

Sonatype can help you navigate DORA compliance

Providers of digital products and services to the EU are being impacted by a suite of new cybersecurity regulations coming into force. Among them is the Digital Operations Resilience Act (DORA), and we’ve developed a checklist to help you manage…

Century-Long Innovation: A Legacy of Outpacing Cyber Threats

Discover how Komori, a century-old printing giant, is leading the charge in cybersecurity innovation by adapting to internet-connected risks and utilizing advanced solutions like NodeZero to safeguard their legacy. The post Century-Long Innovation: A Legacy of Outpacing Cyber Threats appeared…

What is the KEV Catalog?

A quick guide to the Known Exploited Vulnerabilities (KEV) catalog. The post What is the KEV Catalog? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: What is the KEV Catalog?

The EU AI Act and the Need for Data-Centric Security

Artificial intelligence (AI) is already embedded deep into the economic and social fabric of the world. It does everything from operating website chatbots to authenticating users with their bank. It keeps planes in the sky and cars on the road.…

International Raids Shut Down Ghost Encrypted Messaging App

Europol headed up an international law enforcement operation against the operators and users of Ghost, an encrypted messaging app that was used by criminal organizations worldwide for drug trafficking, money laundering, and threating to kill or harm people. The post…

Rethinking TPRM: Managing Third-Party SaaS Risks | Grip

Discover how to close the gaps in TPRM with better third-party risk management. Learn how Grip and SecurityScorecard protect against hidden shadow SaaS risks. The post Rethinking TPRM: Managing Third-Party SaaS Risks | Grip appeared first on Security Boulevard. This…

Best 10 Regulatory Change Management Software of 2024

Blog: Best 10 Regulatory Change Management Software of 2024 According to a recent KPMG report, 43% of Chief Ethics and Compliance Officers (CCOs) find new regulatory requirements their greatest challenge. To manage these changes effectively, 45% will focus on automating…

Two QEMU Vulnerabilities Fixed in Ubuntu 24.04 LTS

Recently, two memory-related flaws were discovered in QEMU, a popular open-source machine emulator and virtualizer. The vulnerabilities, identified as CVE-2024-26327 and CVE-2024-26328, affect QEMU versions 7.1.0 through 8.2.1. Both vulnerabilities stem from mishandling of memory operations within the QEMU codebase.…

FBI Disrupts Another Massive Chinese-Linked Botnet

The FBI and other U.S. and international law enforcement agencies disrupted a massive botnet created by China-linked threat group Flax Typhoon that had pulled in more than 200,000 IoT and other connected devices over the past for years. The post…