Category: Security Boulevard

SonarQube 10.6 Release Announcement

The 10.6 release of SonarQube includes some significant changes, such as autoscaling in Kubernetes, auto-configuration for C and C++ projects, support for running in a FIPS-enforced environment, set rule priority to uphold your coding standards, easy setup of monorepos, monitoring…

Hacking APIs with HTTPie

Learn why HTTPie is a great replacement for curl and how to use it when conducting your own API security testing. The post Hacking APIs with HTTPie appeared first on Dana Epp’s Blog. The post Hacking APIs with HTTPie appeared…

Top 6 Compliance Reporting Tools in 2024

What is a Compliance Report? A compliance report describes how successfully or poorly a company complies with security and business-related regulations. It is distributed to various audiences, including the board, senior executives, regulators, business partners, third-party vendors, etc. Whatever compliance…

How AttackIQ Can Bolster CORA Compliance in the Federal Government

Federal agencies need strong security controls and continuous compliance. The Cyber Operational Readiness Assessment (CORA) by the DHS and industry partners enhances critical infrastructure resilience against cyber threats. The post How AttackIQ Can Bolster CORA Compliance in the Federal Government…

Reverse engineering eBPF programs

eBPF is one of the most widely used technologies in today’s computing ecosystem, starting from the cloud sector The post Reverse engineering eBPF programs appeared first on ARMO. The post Reverse engineering eBPF programs appeared first on Security Boulevard. This…

Intermediate vs Root Certificates

PKI ensures secure digital communication by verifying online entities. Root and intermediate certificates create a trust chain, ensuring information integrity. The post Intermediate vs Root Certificates appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

StealC & Vidar Malware Campaign Identified

Weekly Threat Intelligence Report Date: June 24, 2024 Prepared by: David Brunsdon, Threat Intelligence – Security Engineer, HYAS Malware developers will use all sorts of techniques to obfuscate their C2 location and keep security analysts from being able to understand…

Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO

Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO Securing AI-Native Platforms: A Comprehensive Approach with SecureFLO In the rapidly evolving landscape of artificial intelligence, ensuring robust cybersecurity measures is more critical than ever. AI-native platforms, which leverage advanced machine learning…

USENIX Security ’23 – A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords

Distinguished Paper Award Winner Authors/Presenters: Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong…