Category: Security Boulevard

What We Know So Far about the Snowflake “Breach”

Cybersecurity headlines are being dominated by reported claims of a significant data breach involving Snowflake, a leading cloud-based data storage… The post What We Know So Far about the Snowflake “Breach” appeared first on Symmetry Systems. The post What We…

Patch Tuesday Update – June 2024

The post Patch Tuesday Update – June 2024 appeared first on Digital Defense. The post Patch Tuesday Update – June 2024 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Patch Tuesday…

Microsoft, Google Come to the Aid of Rural Hospitals

Microsoft and Google will provide free or low-cost cybersecurity tools and services to rural hospitals in the United States at a time when health care facilities are coming under increasing attack by ransomware gangs and other threat groups. For independent…

Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked

Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts. The post Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked appeared first on Security Boulevard. This article has been…

Risks of poor PKI management

Public Key Infrastructure (PKI) is essential for businesses to maintain data security and protect digital communications. However, implementing a PKI is just the first step—you must support it with proper ongoing management to reap the benefits and prevent security exposures.…

Growing Cyber Threats Amid Israel-Palestine Tensions

Growing Cyber Threats Focus on Ransomware, Infostealers, and Defacements This blog continues our geopolitical series, highlighting the growing cyber threats during the ongoing Israel-Palestine tensions. Recent months have seen a significant increase in cyberattacks targeting Israeli institutions, with a particular…

Cloud Penetration Testing: Tools, Methodology & Prerequisites

Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical functions. While the cloud offers scalability and agility, it also introduces new security challenges. Cloud penetration testing is a crucial defence mechanism for proactively identifying and addressing these vulnerabilities.…

A Comprehensive Guide to API Penetration Testing

  What is API Penetration Testing? API penetration testing, or API pentesting, is a specialised form of security testing focused on identifying and addressing security vulnerabilities within an API (Application Programming Interface). APIs are the backbone of modern web applications,…

Ghostwriter v4.2

Ghostwriter v4.2: Project Documents & Reporting Enhancements After April’s massive Ghostwriter v4.1 release, we received some great feedback and ideas. We got a little carried away working on these and created a release so big we had to call it…