NTLM (NT LAN Manager) relaying is an attack technique that has been around for years yet is still incredibly effective. […] The post Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques appeared first on Security Boulevard. This article has…
Category: Security Boulevard
RSAC Fireside Chat: Qwiet AI leverages graph-database technology to reduce AppSec noise
AppSec has never been more challenging. By the same token, AppSec technology is advancing apace to help companies meet this challenge. Related: AppSec market trajectory At RSAC 2024, I sat down with Bruce Snell, cybersecurity strategist at Qwiet.ai… (more…) The…
Human Error and AI Emerge as Key Challenges in Survey of CISOs
The 2024 Proofpoint “Voice of the CISO” report is a useful barometer for understanding the current cybersecurity landscape, providing valuable insights from 1,600 CISOs globally. This year’s findings reveal a complex picture where heightened concerns coexist with a growing sense…
BTS #30 – Systems Of Trust – Robert Martin
Bob Martin comes on the show to discuss systems of trust, supply chain security and more! Show Notes The post BTS #30 – Systems Of Trust – Robert Martin appeared first on Eclypsium | Supply Chain Security for the Modern…
USENIX Security ’23 – PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel
Authors/Presenters:Zicheng Wang, Yueqi Chen, Qingkai Zeng Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the…
Prompt Injection Threats Highlight GenAI Risks
88% of participants in the Immersive “Prompt Injection Challenge” successfully tricked a GenAI bot into divulging sensitive information. The post Prompt Injection Threats Highlight GenAI Risks appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
Security Compliance 101: What It Is and How to Master It
Talk to any compliance officer today, and they will all agree that modern security compliance — fulfilling your organization’s regulatory obligations to keep data safe, secure, and intact — must be a top priority for every business. But what, exactly,…
Ransomware, BEC, GenAI Raise Security Challenges
According to a global Arctic Wolf survey of over 1,000 senior IT and cybersecurity decision-makers, seven in 10 organizations were targeted by BEC attacks in the past year. The post Ransomware, BEC, GenAI Raise Security Challenges appeared first on Security…
CFO Deepfake Redux — Arup Lost $26M via Video
Deepfake Zoom of Doom: Construction giant Arup Group revealed as victim of January theft—10% of net profit lost. The post CFO Deepfake Redux — Arup Lost $26M via Video appeared first on Security Boulevard. This article has been indexed from…
What You Need to Know About SEC Compliance Requirements
Catch up on the latest SEC compliance guidance and learn how risk-based vulnerability management can help you align to reporting requirements. The post What You Need to Know About SEC Compliance Requirements appeared first on Security Boulevard. This article has…
USENIX Security ’23 – USENIX Security ’23 – Content-Type: multipart/oracle – Tapping into Format Oracles in Email End-to-End Encryption
Authors/Presenters: Fabian Ising, Damian Poddebniak and Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at…
Exploring the Role of ISO/IEC 42001 in Ethical AI Frameworks
This blog delves into ISO/IEC 42001 and its role in the ethical and responsible development, deployment, and use of AI technologies. The post Exploring the Role of ISO/IEC 42001 in Ethical AI Frameworks appeared first on Scytale. The post Exploring…
Bridging the NHI security gap: Astrix and Torq partner up
While zero-trust policies and identity-centric programs excel at protecting user identities and login credentials with IAM policies and security tools like MFA or IP restrictions, non-human identities (NHIs) like API keys, OAuth apps, service accounts, and secrets often lack visibility,…
Hackers Leverage AI as Application Security Threats Mount
Reverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying trends in a recent report. AI and ML are making life easier for developers. They’re also making life easier…
FUD: How Fear, Uncertainty, and Doubt can ruin your security program
The post FUD: How Fear, Uncertainty, and Doubt can ruin your security program appeared first on Click Armor. The post FUD: How Fear, Uncertainty, and Doubt can ruin your security program appeared first on Security Boulevard. This article has been…
Back to Cooking: Detection Engineer vs Detection Consumer, Again?
This is not a blog about the recent upheaval in the magical realm of SIEM. We have a perfectly good podcast / video about it (complete with hi-la-ri-ous XDR jokes, both human and AI created). This is about something that…
SaaS BOM: The Advantage for Securing SaaS Ecosystems
Introduction It’s not a secret that organizations are increasingly investing in software-as-a-service (SaaS) solutions. It’s not just about keeping pace with competitors; it’s about maximizing efficiency, enhancing collaboration, and driving innovation. However, this power brings challenges, especially the complexities and…
USENIX Security ’23 – Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages
Authors/Presenters: Iskander Sanchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the…
Using Open-Souce and Built-In Tools for Supply Chain Validation
The post Using Open-Souce and Built-In Tools for Supply Chain Validation appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post Using Open-Souce and Built-In Tools for Supply Chain Validation appeared first on Security Boulevard. This…
Sensitive Data Detection using AI for API Hackers
Learn how to use artificial intelligence (AI) to discover sensitive data in the APIs you are hacking with the help of Microsoft Presidio. The post Sensitive Data Detection using AI for API Hackers appeared first on Dana Epp’s Blog. The…