Overview Unconstrained delegation is a feature in Active Directory that allows a computer, service, or user to impersonate any other user and access resources on their behalf across the entire network, completely unrestricted. A typical example of a use case…
Category: Security Boulevard
Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own
Steamboat bloat: Hacktivist group wields infostealer Trojan, leaks 1,200 GB of mouse droppings. The post Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign
The APT group Void Banshee exploited a now-patched Windows security flaw and the retired Internet Explorer browser to distributed the Atlantida malware to steal system information and sensitive data from victims. The post Void Banshee Group Used ‘Windows Relic’ IE…
Safeguarding Your Collaboration Tools: Tackling the New Favorite Targets of Attackers
Secrets in collaboration tools are becoming prime targets for attackers. Reduce your attack surface by extending GitGuardian automated secrets detection capabilities to Slack, Jira, Confluence, or Microsoft Teams. Ensure security wherever your teams collaborate! The post Safeguarding Your Collaboration Tools:…
Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud Security Before Going ‘All In’ on Generative AI
Generative AI has great potential for scaling and automating security practices, but to be effective, organizations need to have a strong security foundation. The post Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud Security Before Going ‘All In’ on Generative…
Baffle Extends Encryption Reach to AWS Databases
Baffle today extended its ability to secure multitenant applications running on the Amazon Web Services (AWS) cloud to include the relational databases many of them are deployed on. The post Baffle Extends Encryption Reach to AWS Databases appeared first on…
Drive-by Download Attacks Become Distribution Medium For FakeBat Malware
Recent findings have revealed that the Loader-as-a-Service (LaaS), known as FakeBat, is now one of the most widespread malware families in the world. The FakeBat malware uses the drive-by download malware technique as a distribution to compromise targets. In this…
Best Practices for Security Orchestration, Automation, and Response
Security orchestration and automation enable faster detection and response to security incidents. Continuous monitoring is essential for identifying and responding to threats in real-time. Regular training and simulation exercises equip your security team to handle real-world incidents effectively. SOAR stands…
Critical OpenSSH Vulnerability (regreSSHion) Gives Root Access
An unauthenticated remote code execution vulnerability (CVE-2024-6387) was discovered in OpenSSH, a widely used tool for secure remote access. Dubbed “regreSSHion”, this race condition vulnerability allows attackers to take complete control in glibc-based Linux systems. Let’s break down what this…
SEG vs. SEG: How Threat Actors are Pitting Email Security Products Against Each Other With Encoded URLs
Email security tools such as Secure Email Gateways (SEGs) often encode URLs that are embedded in emails. This enables the security appliance to scan the URL before the recipient visits the website. Oftentimes when SEGs detect URLs in emails that…
GUEST ESSAY: Consumers, institutions continue to shoulder burden for making mobile banking secure
The rapid adoption of mobile banking has revolutionized how we manage our finances. Related: Deepfakes aimed at mobile banking apps With millions of users worldwide relying on mobile apps for their banking needs, the convenience is undeniable. However, this surge…
Why SMB Security Needs Efficient Device Management
SMBs are increasingly becoming the cyberattacker’s goldmine. Device management is one way to stay ahead of malicious actors and protect your crown data jewels. The post Why SMB Security Needs Efficient Device Management appeared first on Security Boulevard. This article…
How Much Does Penetration Testing Cost?
Curious about how much penetration testing costs? You understand its importance, but budgeting for different pentests can be a challenge. This blog post will guide you through the intricacies of… The post How Much Does Penetration Testing Cost? appeared first…
NSFOCUS Recognized in Forrester’s Enterprise Firewall Landscape Report, Q2 2024
SANTA CLARA, Calif., July 17, 2024 – NSFOCUS, a leading cybersecurity company, is proud to announce its inclusion in the prestigious The Enterprise Firewall Landscape, Q2 2024 report by Forrester, a globally recognized research and advisory firm. NSFOCUS has been…
Report Identifies More Than 250 Evil Twin Mobile Applications
The Satori Threat Intelligence Team funded by HUMAN Security, a provider of a platform thwarting bot-based attacks, today disclosed it has uncovered a massive ad fraud operation involving the setting up of “evil twins” of applications found in the Google…
Patagonia Sued for Using AI-Based Software to Analyze Customer Calls
A class-action lawsuit claims that outdoor clothing retailer Patagonia violated plaintiffs’ privacy rights by letting Talkdesk’s AI-based call center products record, store, and analyze customer conversations without their knowledge or consent. The post Patagonia Sued for Using AI-Based Software to…
Russian Antivirus Firm Kaspersky Shuts Down U.S. Operations After Ban
A month after the U.S. Commerce Department banned it from selling its security software in the country, Russian company Kaspersky Lab said it is shuttering its U.S. operations and laying off staff in the country by July 20. The post…
Randall Munroe’s XKCD ‘A Crossword Puzzle’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2957/” rel=”noopener” target=”_blank”> <img alt=”” height=”937″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/048dc16a-f3f0-470d-923a-fc23142cdccd/a_crossword_puzzle.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘A Crossword Puzzle’ appeared first on Security…
Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen)
DeFAIL: Cryptocurrency fans lose their worthless tokens via phishing attacks on decentralized finance sites. The post Squarespace Hacked — DeFi Wallets Drained (Imaginary Money Stolen) appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Three Ways Ox Security Helps You Achieve FedRAMP
Compliance mandates are a fact of life for security teams. There is no shortage of rules and regulations businesses must meet to certify that their organizations are architecting to specified standards for data handling, access controls, testing and auditing, and…