Next week our founder Simon Moffatt will be speaking at event in London with leading customer identity and access management platform provider Transmit Security. The event is entitled “The Fusion of Identity Management and Fraud Prevention” and will take place…
Category: Security Boulevard
CISA Alert: GitLab Password Exploit – Act Now For Protection
In the realm of cybersecurity, vigilance is paramount. Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) flagged a critical vulnerability in GitLab, a popular platform for collaborative software development. This GitLab password exploit tracked as CVE-2023-7028, has been actively…
How an Intrusion Detection System Can Ensure End-User Security
It’s never been more important for businesses to invest in the best security measures available to them. Hackers and cybercriminals are constantly attempting to attack organizations and access their data. What’s more, cyber attacks are becoming increasingly sophisticated and new…
Thunderbird Vulnerabilities Fixed in Ubuntu and Debian
In recent Ubuntu and Debian security updates, several vulnerabilities have been addressed in Thunderbird, the popular open-source mail and newsgroup client. Attackers could use these vulnerabilities to cause a denial of service, execute arbitrary code, or disclose sensitive information. The…
The Rise of AI and Blended Attacks: Key Takeaways from RSAC 2024
The 2024 RSA Conference can be summed up in two letters: AI. AI was everywhere. It was the main topic of more than 130 sessions. Almost every company with a booth in the Expo Hall advertised AI as a component…
A Guide to Cybersecurity Compliance in the Oil and Gas Industry
When talking about industries, few are as critical to global infrastructure and economic stability as the oil and gas sector. In an interconnected digital age where technology fuels every aspect of the global economy, the oil and gas industry stands…
RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?)
RSA (“RSAI”) Conference 2024 Powered by AI with AI on Top — AI Edition (Hey AI, Is This Enough AI?) Where do we have “41,000 attendees, 650 speakers, 600 exhibitors and 400 members of the media” who all care about cyber security? Ha,…
What is a POAM
If you’re a defense contractor and need to comply with NIST 800-171, then you need to know about System Security Plans (SSPs) and Plans of Actions & Milestones (POAMs). SSPs document how your organization meets NIST 800-171’s 110 controls. Check…
UnitedHealth, Ascension Attacks Feed Debate Over Health Care Security
The Biden Administration is moving to cybersecurity standards for hospitals, but the AHA is pushing back, saying voluntary models are enough. The post UnitedHealth, Ascension Attacks Feed Debate Over Health Care Security appeared first on Security Boulevard. This article has…
CAPTCHA Farms Can’t Sneak Past DataDome
CAPTCHA farms easily bypass basic CAPTCHAs across the internet. Learn how DataDome’s sophisticated protection detects and stops bypassed CAPTCHA challenges in their tracks. The post CAPTCHA Farms Can’t Sneak Past DataDome appeared first on Security Boulevard. This article has been…
Easily Guessed Passwords for New Accounts Include “User”, “Temp”, “Welcome”
New account passwords, often used during onboarding, are vulnerable to sophisticated attacks from malicious actors. Good idea to check: What’s your company using? The post Easily Guessed Passwords for New Accounts Include “User”, “Temp”, “Welcome” appeared first on Security Boulevard.…
Reverse Engineering Electron Apps to Discover APIs
Learn how to reverse engineer an Electron app to find artifacts like source code and API endpoints, and capture live traffic with Burp Suite. The post Reverse Engineering Electron Apps to Discover APIs appeared first on Dana Epp’s Blog. The…
RSAC 2024 Highlights — Connecting on API Security and Bot Management
Another RSAC has wrapped! Thank you to everyone who stopped by our booth to learn how the Cequence Unified API Protection platform’s integrated API security and bot management eliminates risk across all phases of the API protection lifecycle. As always,…
Agent-Based vs Agentless File Integrity Monitoring: Which is Best?
Compliance and information security risk mitigation are a 24/7/365 business. The 2024 Verizon Data Breach Investigations Report indicates a substantial 180% increase in the exploitation of vulnerabilities since 2023. Organizations that develop a comprehensive approach to information security can not…
USENIX Security ’23 – A Peek Into The Metaverse: Detecting 3D Model Clones In Mobile Games
Authors/Presenters: Chaoshun Zuo, Chao Wang, Zhiqiang Lin Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via…
ReversingLabs Search Extension for Splunk Enterprise
ReversingLabs has released a new application for Splunk users to enhance their data using ReversingLabs APIs. This application is titled “ReversingLabs Search Extension for Splunk Enterprise,” and it replaces the earlier “ReversingLabs External Lookup for Splunk.” The latest release significantly…
Simplify Certificate Lifecycle Management And Build Security Into OpenShift Kubernetes Engine With AppViewX KUBE+
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. Building on top of Kubernetes, Red Hat OpenShift Kubernetes Engine is a container application platform that offers additional features and tools to further…
Sectrio and DigiGlass inaugurate State-of-the-Art OT/ICS SOC with Device Testing Lab in the UAE
Dubai, United Arab Emirates, May 14th, 2024 - DigiGlass by Redington, Managed Security Services Distributor (MSSD), and Sectrio, a global leader in OT/ICS and IoT cybersecurity solutions, cyber threat intelligence, and managed security services today inaugurated the first Industrial Control System/Operational…
What are OAuth Tokens, and why are they important to Secure?
What are OAuth Tokens? OAuth (Open Authorization) Tokens are Non-Human Identities that work as a secure authentication mechanism. They delegate access to third parties or external apps without exposing your environment’s sensitive credentials. Organizations that rely on third-party applications and…
What are Service Accounts, and why are they Important to Secure?
What are Service Accounts? Service Accounts are Non-Human Identity accounts used by machines or apps to communicate with one another within a system, unlike user or human accounts. Service Accounts, using machine credentials, provide privileged identities and permissions for applications,…