A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at the GHOSTENGINE exploit in detail, shedding light on its modus…
Category: Security Boulevard
Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for Data Security Posture Management report
San Mateo, Calif. – JUNE 6, 2024 – Symmetry Systems, the data+AI security company, today announced it has been named… The post Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for…
IoT Security Means Remediation Not Mitigation
A topic that I recently got asked about was vulnerability mitigation for IoT systems, which shows that even within the security community there is still a belief that mitigation equals threat resolution. For IoT systems this simply does not work…
BTS #31 – Managing Complex Digital Supply Chains – Cassie Crossley
Cassie has a long history of successfully managing a variety of security programs. Today, she leads supply chain efforts for a very large product company. We will tackle topics such as software supply chain management, SBOMs, third-party supply chain challenges,…
Safeguarding AWS AI Services: Protecting Sensitive Permissions
As AI continues to grow in importance, ensuring the security of AI services is crucial. Our team at Sonrai attended the AWS Los Angeles Summit on May 22nd, where we noted how big of a role AI is going to…
Cybersecurity Training Reduces Phishing Threats – With Numbers to Prove It
Train people. It makes a difference. In organizations without security awareness training, 34% of employees are likely to click on malicious links or comply with fraudulent requests. The post Cybersecurity Training Reduces Phishing Threats – With Numbers to Prove It…
RansomHub Rides High on Knight Ransomware Source Code
RansomHub, which has become among the most prolific ransomware groups over the past few months, likely got its start with the source code from the Knight malware and a boost from a one-time BlackCat affiliate. The post RansomHub Rides High…
CEO Corner: Preparing for the Unavoidable – Why Incident Response Readiness is Non-Negotiable
Twenty years ago, I began my career in information security. It was all about firewalls (the heyday of Checkpoint), content filtering (remember Bluecoat) and anti-virus (Symantec and McAfee were the name of the game). We were monitoring our network with…
USENIX Security ’23 – HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
Authors/Presenters:Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…
How Poor Cryptographic Practices Endanger Banking Software Security
In today’s digital age, financial institutions rely heavily on encryption to protect sensitive data in their banking applications. However, despite the critical role of cryptography, many implementations suffer from fundamental flaws that create a false sense of security. Misconceptions about…
Why Digital Threats are the New Frontier in Executive Protection
The landscape of threats facing executives has expanded far beyond the physical realm, and home is the new attack surface. Traditional security measures, while still essential, are no longer sufficient on their own to protect high-profile individuals from the myriad…
MSPs Look to Streamline Cybersecurity Partnerships, Skills Shortage Persists
A rising volume of risks, shortage of qualified cybersecurity professionals and time management with vendors are among the challenges MSPs face. The post MSPs Look to Streamline Cybersecurity Partnerships, Skills Shortage Persists appeared first on Security Boulevard. This article has…
Certificate Lifecycle Management The Key to Robust Digital Security in Healthcare
The need for robust digital security has never been more critical. As cyber threats become increasingly sophisticated, managing digital certificates effectively is paramount for protecting sensitive information and ensuring seamless operations. The post Certificate Lifecycle Management The Key to Robust…
8 Takeaways from Apple 2023 Threat Research
The newly-released Apple cybersecurity threat study reveals interesting data points and demonstrates how the threat landscape is evolving. The post 8 Takeaways from Apple 2023 Threat Research appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
SecOps Teams Shift Strategy as AI-Powered Threats, Deepfakes Evolve
An escalation in AI-based attacks requires security operations leaders to change cybersecurity strategies to defend against them. The study found 61% of respondents had experienced a deepfake incident in the past year, with 75% of those attacks impersonating CEOs or…
Russian Threat Groups Turn Eyes to the Paris Olympic Games
Russian threat groups are using old tactics and generative AI to run malicious disinformation campaigns meant to discredit the Paris Olympic Games, France and its president, and the IOC fewer than two months before the Games begin. The post Russian…
NIST 2.0: Securing Workload Identities and Access
5 min read The updated framework addresses the need to secure non-human identities. Here’s how that can extend across the guidance’s five key functions. The post NIST 2.0: Securing Workload Identities and Access appeared first on Aembit. The post NIST…
Life in the Swimlane with Emily Spector, Senior SDR
The post Life in the Swimlane with Emily Spector, Senior SDR appeared first on AI Enabled Security Automation. The post Life in the Swimlane with Emily Spector, Senior SDR appeared first on Security Boulevard. This article has been indexed from…
The Role of DevSecOps in Enhancing CNAPP Efficiency
Incorporating DevSecOps into CNAPP strategies can improve the way organizations develop and secure their applications. The post The Role of DevSecOps in Enhancing CNAPP Efficiency appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Security challenges in the financial sector⎪Max Imbiel (CISO, Bitpanda)
This blog is based on the podcast episode with Max Imbiel, CISO at Bitpanda. It covers the unique challenges of building secure financial applications. The post Security challenges in the financial sector⎪Max Imbiel (CISO, Bitpanda) appeared first on Security Boulevard.…