Category: Security Boulevard

Randall Munroe’s XKCD ‘Physics vs. Magic’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2904/” rel=”noopener” target=”_blank”> <img alt=”” height=”294″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/9676c489-ef79-429e-8d32-417f246bd40a/physics_vs_magic.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Physics vs. Magic’ appeared first on…

JetBrains Says Rapid7’s Fast Release of Flaw Details Harmed Users

JetBrains is continuing to criticize Rapid7’s policy for disclosing vulnerabilities its researchers uncover, saying the cybersecurity firm’s quick release of details of flaws in JetBrains’ TeamCity platform harmed some customers and runs counter to other companies’ processes. Rapid7 disclosed details…

New Phishing Campaign Delivers Remote Access Trojans (RATs)

Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to distribute remote access trojans (RATs), such as VCURMS…

Building a Security Culture of Shared Responsibility

These seven major factors can contribute to (or hinder) the development of a positive cybersecurity culture. The post Building a Security Culture of Shared Responsibility appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

SVG Files Abused in Emerging Campaigns

By Max Gannon Scalable Vector Graphic files, or SVG files, are image files that have become an advanced tactic for malware delivery that has greatly evolved over time. The use of SVG files to deliver malware was made even easier…

Charting a Course for Cybersecurity

Over the past months, headlines have been marked by persistent conflicts in Ukraine and Israel. Cybercriminals took—and continue to take—advantage of a volatile geopolitical situation and relentlessly exploited vulnerabilities. 2023 also saw the rise of generative AI involvement in cyber…

What is Identity Governance: 5 Steps to Build Your Framework

From financial records to employees’ personal details, almost all information nowadays is highly sensitive – and, therefore, highly valuable to attackers.  With 61% of data breaches involving credentials, it’s unsurprising that Identity and Access Management (IAM) is showcasing such rapid…

Mitigating Risks in the Age of AI Agents

#TLDR AI agent technology, using Large Language Models, is transforming modern enterprises as it provides software and digital assistance. However it introduces significant security risks like data exposure and supply chain risks. This blog examines these issues and highlights Symmetry…

Tweaks Stealer Targets Roblox Users Through YouTube and Discord

IntroductionZscaler’s ThreatLabz recently discovered a new campaign distributing an infostealer called Tweaks (aka Tweaker) that targets Roblox users. Attackers are exploiting popular platforms, like YouTube and Discord, to distribute Tweaks to Roblox users, capitalizing on the ability of legitimate platforms…

Control the Network, Control the Universe

March 19, 2024Time: 1:00 pm ET | 10:00 am PT The ever-evolving landscape of network security faced new challenges in 2023 as hackers developed sophisticated methods to exploit vulnerabilities in network devices. Join Nate Warfield, Director of Threat Research, as…

Broadcom Merging Carbon Black, Symantec to Create Security Unit

Carbon Black’s uncertain future following the closing of Broadcom’s $69 billion acquisition of VMware in November is now settled, with the security software business merging with Symantec to form Broadcom’s new Enterprise Security Group. Broadcom will make “significant investments in…

ChatGPT and Beyond: Generative AI in Security

The application of generative AI in security is a game-changer, offering novel solutions to pressing challenges in cybersecurity. The post ChatGPT and Beyond: Generative AI in Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Read the Latest NIST Cybersecurity Framework Updates

This blog reviews NIST cybersecurity framework 2.0 updates, and the difference between the CSF and NIST’s data privacy framework. The post Read the Latest NIST Cybersecurity Framework Updates appeared first on Security Boulevard. This article has been indexed from Security…

Mitigating Lurking Threats in the Software Supply Chain

The first step to addressing software supply chain vulnerabilities and threats is to understand the most common attacks. Here’s where to start. The post Mitigating Lurking Threats in the Software Supply Chain appeared first on Security Boulevard. This article has…