The January ransomware attack on loanDepot has so far cost the mortgage lender $26.9 million, including $25 million toward the possible settlement of a related class action lawsuit, company executives said in their Q2 financial report. The post Ransomware Attack…
Category: Security Boulevard
Operational Technology (OT) Security a Top Priority for CIOs
The convergence of operational technology (OT) and information technology (IT) networks has created a complex environment increasingly vulnerable to cyberattacks, a challenge compounded by a backlog of legacy systems, an expanding attack surface and an overstretched workforce. The post Operational…
Web-Connected Industrial Control Systems Vulnerable to Attack
Half of the 40,000 internet-connected industrial control systems (ICS) devices in the U.S., more than half of which are associated with building control and automation protocols, run low-level automation protocols found in wireless and consumer access networks, including those of…
Our Latest Product Updates
We’re constantly improving our product for our customers. See the latest features, improvements, and fixes we have shipped over the past month. The post Our Latest Product Updates appeared first on Security Boulevard. This article has been indexed from Security…
Dude, Where’s My Documentation?
When the zero day hits the fan, can you find the information you need? The post Dude, Where’s My Documentation? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Dude, Where’s My…
BIND Vulnerabilities: Urgent Security Updates Released
Several high-severity vulnerabilities have been discovered in BIND, potentially exposing millions of DNS servers to denial-of-service attacks. These issues have prompted urgent security updates from major Linux distributions such as Ubuntu and Debian. In this article, we explore the details…
7 Best Cyber Risk Management Platforms of 2024
In today’s digital age, cybersecurity is a central pillar of Governance, Risk, and Compliance (GRC). But why is this so crucial, and why is there a burgeoning market for specialized cyber risk management tools and platforms? John Chambers, former CEO…
Cloud Data Storage Raises New Security Issues
Advancements in cloud computing have made securing data more complicated. Fortifying servers in data centers to protect sensitive information no longer provides adequate protection. The cloud has become the data repository for everything, and data security must keep pace. The…
RAD Security Combines AI With Behavioral Analytics to Improve Cybersecurity
RAD Security this week at the Black Hat USA 2024 conference revealed it has added artificial intelligence (AI) capabilities to its cloud detection and response (CDR) platform as part of an ongoing effort to reduce dependencies on signatures that need…
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
Overview Leveraging NSFOCUS’s Global Threat Hunting System, NSFOCUS Security Labs (NSL) captured an attack campaign targeting Azerbaijan and Israel on July 1, 2024. By analyzing the tactics, attack vectors, weapons, and infrastructure of the attack in this incident, it was…
Democracy’s Challenge: Secure Elections Worldwide
LAS VEGAS — The U.S. presidential election is less than three months away, and many cybersecurity experts are bracing for a deluge of deceit. During a Black Hat 2024 keynote panel Wednesday morning, international leaders outlined how they are approaching…
D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR
D3’s Legacy SOAR Migration Program enables organizations to move from underperforming SOAR tools to D3’s Smart SOAR in record time. The post D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR appeared first on D3 Security. The…
Student Devices Wiped — Mobile Guardian Hacked AGAIN
Hackers ate my homework: MDM software for schools is breached for second time this year—13,000 devices wiped in Singapore alone. The post Student Devices Wiped — Mobile Guardian Hacked AGAIN appeared first on Security Boulevard. This article has been indexed…
Randall Munroe’s XKCD ‘Matter’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2967/” rel=”noopener” target=”_blank”> <img alt=”” height=”341″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0f1e3af5-3aef-4b4a-93e4-88cffe704f92/matter.png?format=1000w” width=”234″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Matter’ appeared first on Security Boulevard. This…
Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level
Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabilities in an IT environment that should be remediated first based on the actual threat they represent. The post Tenable Adds Ability to Prioritize…
USENIX Security ’23 – Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree
Authors/Presenters:Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim…
Sysdig Adds Ability to Correlate Identities to Cloud Computing Breaches
Sysdig today extended the reach of the cloud detection and response platform by adding the ability to correlate identity behavior with workload activity and cloud resources. Maya Levine, a product manager for Sysdig, said Cloud Identity Insights collects data using…
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these attacks. The post This Caller Does Not Exist:…
Rubrik Allies With Mandiant to Increase Cyber Resiliency Capability
Rubrik at the Black Hat USA 2024 conference today revealed it is partnering with the Mandiant arm of Google to reduce the amount of time organizations require to recover from a cybersecurity breach. The post Rubrik Allies With Mandiant to…
Hunters International RaaS Group Points SharpRhino at IT Workers
Hunters International, a fast-rising RaaS group, is using a typosquatting domain for the open source Angry IP Scanner tool to deliver a novel RAT malware called SharpRhino in a campaign targeting IT workers. The post Hunters International RaaS Group Points…