IntroductionIn June 2024, Zscaler ThreatLabz detected fresh activity from BlindEagle, an advanced persistent threat (APT) actor also identified as AguilaCiega, APT-C-36, and APT-Q-98. BlindEagle predominantly focuses on organizations and individuals from the government and finance sector in South America, particularly…
Category: Security Boulevard
How StorageGuard Can Assist With CISA’s Advised Mitigations For Newly Emerged BlackSuit Ransomware
In August, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a joint alert about the emergence of BlackSuit ransomware, The post How StorageGuard Can Assist With CISA’s Advised Mitigations For Newly Emerged BlackSuit…
Storage & Data Protection Trends & Innovations To Watch in 2025
It’s all about the data. One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. And from The post Storage & Data Protection Trends & Innovations To Watch in 2025 appeared…
The Deception Game: How Cyber Scams Manipulate Trust to Access Sensitive Information
In recent years, the landscape of cyber scams has evolved, targeting even the tools designed to protect consumers. One such concerning development involves the exploitation of trusted services to mislead and scam users. This article explores a specific case in…
Choosing the Best Cybersecurity Prioritization Method for Your Organization
Threat monitoring and detection, such as Network Detection and Response (NDR), provide a complement to enhance a threat exposure management strategy. The post Choosing the Best Cybersecurity Prioritization Method for Your Organization appeared first on Security Boulevard. This article has…
RansomHub Emerges in Rapidly Evolving Ransomware Landscape
The ransomware space is becoming increasingly fragmented in the wake of law enforcement actions against BlackCat, LockBit, and others, spawning more threat groups and giving rise to prolific newcomers like RansomHub, according to a report by Searchlight Cyber. The post…
Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Cybersecurity has never been something to set once and leave running in the background — it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organizations struggle to secure…
Cloud Access Security Brokers (CASBs): Are They Still Relevant?
Understanding how CASBs are developed and how to use them effectively can assist them in safeguarding their cloud-based assets against evolving threats. The post Cloud Access Security Brokers (CASBs): Are They Still Relevant? appeared first on Security Boulevard. This article…
A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel
In the world of SaaS ITDR, the journey taken matters. There are solutions that began from an ITDR perspective. They built threat-hunting capabilities to parse through any data set, look for anomalies, and flag any activity that looks suspicious. It’s…
News alert: Blackwired launches ‘ThirdWatch?’ — an advanced third-party risk management platform
Singapore, Sept. 4, 2024, CyberNewsWire — Blackwired, the leading cyber observatory for disruptive cybersecurity technologies, has announced the launch of ThirdWatch?, a groundbreaking solution to identify direct threats facing an organization and its Third Parties. ThirdWatch? is a subject-directed ……
News alert: INE Security releases a strategies guide for cyber threat preparedness, response capabilities
Cary, NC, Sept. 4, 2024, CyberNewsWire — In a proactive response to the rapidly evolving landscape of cyber threats, INE Security, a global leader in cybersecurity and network training, today unveiled a crucial initiative aimed at fortifying corporate defenses ……
News alert: AI SPERA attains PCI DSS certification for its search engine solution ‘Criminal IP’
Torrance, Calif., Sept. 4, 2024, CyberNewsWire — AI SPERA, a leading Cyber Threat Intelligence (CTI) company, has achieved PCI DSS v4.0 certification for its flagship search engine solution, Criminal IP. This accomplishment builds on last year’s attainment of PCI ……
August Recap: New AWS Sensitive Permissions and Services
As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in August 2024. Our intention in sharing this is to…
White House Wants to Tighten Internet Routing Security
The White House is urging internet network providers to take steps outlined in its roadmap to better secure the Border Gateway Protocol, a set of rule that are not widely known but are crucial to routing traffic around the internet.…
FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways. Here is an example that the FBI is showcasing: 1. A person from your dream company,…
Daniel Stori’s Turnoff.US: ‘pid 1’
<a class=” sqs-block-image-link ” href=”https://turnoff.us/geek/pid1/” rel=”noopener” target=”_blank”> <img alt=”” height=”618″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/bee1d45d-fc1a-4d7f-9a3b-fcb4165104a9/pid-1.jpeg?format=1000w” width=”640″ /> </a><figcaption class=”image-caption-wrapper”> via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘pid 1’ appeared first on Security Boulevard. This article has been indexed…
USENIX Security ’23 – ProSpeCT: Provably Secure Speculation for the Constant-Time Policy
Authors/Presenters:Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Sophia Antipolis; Frank Piessens Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…
Secure by Demand: Going Beyond Questionnaires and SBOMs
CISA’s Secure by Demand guidance provides a list of questions that enterprise software buyers should ask software producers to evaluate their security practices prior to, during and after procurement. It’s a good idea in principle as every organization needs to…
Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL?
USB MFA SCA😱: Infineon hardware and software blamed for timing side-channel attack on popular auth tokens. The post Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Cthulhu Stealer: New macOS Malware Targets Apple Users’ Data
As per recent reports, a new macOS malware, dubbed the Cthulhu stealer, has been discovered by cybersecurity researchers. The information stealer is designed to target macOS hosts and is capable of harvesting a wide range of information. In this article,…