The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Today, let’s get to know the company RAD Security. Company…
Category: Security Boulevard
MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise
The MITRE ATT&CK framework is a continually evolving resource, tracking the tactics, techniques, and procedures (TTPs) employed by adversaries across all phases of an attack. The recent v15 release brings valuable updates and Obsidian Security is honored to have contributed…
KapeKa Backdoor: Russian Threat Actor Group’s Recent Attacks
In the realm of cybersecurity, vigilance is paramount. Recent discoveries have shed light on a previously undisclosed threat known as Kapeka, a versatile backdoor quietly making its presence felt in cyber attacks across Eastern Europe. Let’s delve into the intricacies…
External Penetration Testing: Cost, Tools, Steps, & Checklist
External penetration testing is a critical cybersecurity practice that helps organisations defend their internet-facing assets. By simulating the actions of a real-world attacker, external penetration tests reveal vulnerabilities in your web applications, networks, and other externally accessible systems. This post…
USPS Phishing Scams Generate Almost as Much Traffic as the Real Site
Bad actors have long impersonated package delivery companies – including the U.S. Postal Service (USPS), FedEx, and UPS among them – in email and text-based phishing scams aimed at convincing unsuspecting targets to either send money or reveal personal information.…
Rubrik Sets Cyber Resiliency Course Following IPO
Rubrik aims to reduce the expertise that NetSecOps needs for an organization to recover from a ransomware attack. The post Rubrik Sets Cyber Resiliency Course Following IPO appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Thoma Bravo to Buy Cybersecurity Firm Darktrace for $5.3 Billion
Private equity firm Thoma Bravo is adding to its already significant portfolio of cybersecurity companies after an agreement reached with Darktrace’s directors to buy the British AI-based security firm for more than $5.3 billion and take it private. Once the…
Orca Security Allies with ModePUSH for Cloud Incident Response
The alliance between the two companies promises to make it easier to triage, investigate, and respond to security incidents. The post Orca Security Allies with ModePUSH for Cloud Incident Response appeared first on Security Boulevard. This article has been indexed…
South Korean iPhone Ban: MDM DMZ PDQ
MDM Hindered: Android phones are still OK; this is Samsung’s home, after all. The post South Korean iPhone Ban: MDM DMZ PDQ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: South…
Managing Generative AI Risk and Meeting M-24-10 Mandates on Monitoring & Evaluation
OMB’s memo M-24-10 (5c. Minimum Practices for Safety-Impacting and Rights-Impacting Artificial Intelligence) is prescriptive (and timebound): No later than December 1, 2024 and on an ongoing basis while using new or existing covered safety-impacting or rights-impacting AI, agencies must ensure…
USENIX Security ’23 – Instructions Unclear: Undefined Behaviour in Cellular Network Specifications
Authors/Presenters: Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, Veelasha Moonsamy Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated…
Everything you need to know about network penetration testing [+checklist to follow]
Network penetration testing is an essential element of a business penetration testing strategy. It focused on the infrastructure assets such as networks, segmentation, network devices, and configuration. This post focuses on network penetration testing, its types, methodology, costs, tools, etc.…
OfflRouter Malware Ukraine: Govt Network Breach Since 2015
As per recent media reports, certain government networks in Ukraine have been infected with the Offlrouter malware since 2015. The Offlrouter malware Ukraine has managed to escape detection for nearly a decade now. However, VBA macro malware has recently come…
Compounded Crisis: Change Healthcare’s Breach Escalates with New Threats
Two months ago, Change Healthcare, a linchpin in the U.S. healthcare system, fell victim to a sophisticated cyberattack by the infamous BlackCat/ALPHV ransomware group. The breach not only paralyzed numerous healthcare services but also exposed the company to extortion demands,…
Multiple PHP 7.4 Vulnerabilities Addressed in Debian 11
Debian 11 was first released on August 14th, 2021 with PHP version 7.4, which has already reached the end of life. This means PHP 7.4 will no longer receive official updates and security fixes from the PHP development team. However,…
Exploring the Key Sections of a SOC 2 Report (In Under 4 Minutes)
What are the key sections of a SOC 2 report, and what do they mean? Here’s what you need to know (in just under 4 minutes). The post Exploring the Key Sections of a SOC 2 Report (In Under 4…
RSAC 2024 Innovation Sandbox | Mitiga: A New Generation of Cloud and SaaS Incident Response Solutions
The RSA Conference 2024 is set to kick off on May 6. Known as the “Oscars of Cybersecurity”, RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Today let’s get to know the company Mitiga. Company…
USENIX Security ’23 – SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes
Authors/Presenters: *Abdullah AlHamdan, Cristian-Alexandru Staicu Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations…
What Would a TikTok Ban Mean?
Where next for the most popular app in the world? President Biden signed a bill that could lead to a nationwide TikTok ban, but will it actually happen? What are the implications? The post What Would a TikTok Ban Mean?…
RSAC 2024 Innovation Sandbox | Antimatter: A Comprehensive Data Security Management Tool
The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Today let’s focus on new hotspots in network security and…