Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts. The post Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked appeared first on Security Boulevard. This article has been…
Category: Security Boulevard
Verizon DBIR 2024: The rise in software supply chain attacks explained
The Verizon Data Breach Investigations Report (DBIR) is considered to be one of the leading annual reports on the state of cybersecurity. The report, which analyzes thousands of data breaches from the previous year, breaks down these incidents by their…
Risks of poor PKI management
Public Key Infrastructure (PKI) is essential for businesses to maintain data security and protect digital communications. However, implementing a PKI is just the first step—you must support it with proper ongoing management to reap the benefits and prevent security exposures.…
Recent glibc Vulnerabilities and How to Protect Your Linux System
The GNU C Library, commonly known as glibc, is a critical component in many Linux distributions. It provides core functions essential for system operations. However, like any software library, it is not immune to vulnerabilities. Recently, multiple security issues have…
Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain Security, Schneider Electric)
This blog is based on our conversation with Cassie Crossley, Vice President of Supply Chain Security at Schneider Electric. It covers the unique challenges of software supply chain security. The post Software Supply Chain Risks ⎪Cassie Crossley (VP Supply Chain…
RSAC Fireside Chat: Ontinue ups the ‘MXDR’ ante — by emphasizing wider automation, collaboration
Companies that need to protect assets spread across hybrid cloud infrastructure face a huge challenge trying to mix and match disparate security tools. Related: Cyber help for hire Why not seek help from a specialist? At RSAC 2024, I ……
Growing Cyber Threats Amid Israel-Palestine Tensions
Growing Cyber Threats Focus on Ransomware, Infostealers, and Defacements This blog continues our geopolitical series, highlighting the growing cyber threats during the ongoing Israel-Palestine tensions. Recent months have seen a significant increase in cyberattacks targeting Israeli institutions, with a particular…
Cloud Penetration Testing: Tools, Methodology & Prerequisites
Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical functions. While the cloud offers scalability and agility, it also introduces new security challenges. Cloud penetration testing is a crucial defence mechanism for proactively identifying and addressing these vulnerabilities.…
What is Mobile Application Penetration Testing: Benefits & Tools
Mobile applications are ubiquitous, but their security can be a concern. Unlike web applications, in a mobile landscape, both the device and the mobile application have a crucial role in security due to increasing cyber threats. Mobile application penetration testing…
A Comprehensive Guide to API Penetration Testing
What is API Penetration Testing? API penetration testing, or API pentesting, is a specialised form of security testing focused on identifying and addressing security vulnerabilities within an API (Application Programming Interface). APIs are the backbone of modern web applications,…
Ghostwriter v4.2
Ghostwriter v4.2: Project Documents & Reporting Enhancements After April’s massive Ghostwriter v4.1 release, we received some great feedback and ideas. We got a little carried away working on these and created a release so big we had to call it…
Breach Debrief Series: Snowflake MFA Meltdown Creates Data Leak Blizzard
On May 27, a threat actor group called ShinyHunters announced that it was selling 560 million records stolen in a data breach. The records include names, email addresses, physical addresses, and partial credit card numbers. This personally identifiable information (PII)…
Is CVSS Alone Failing Us? Insights From Our Webinar With Verizon
In a recent webinar with Verizon, we discussed how organizations measure and prioritize their vulnerabilities. We reviewed insights from Verizon’s 2024 Data Breach Investigations Report, and double-clicked on data to answer several other key questions, such as: Is the Common…
Fortinet to Expand AI, Cloud Security with Lacework Acquisition
Fortinet, known for network security capabilities within its Fortinet Security Fabric cybersecurity platform, is bolstering its AI and cloud security capabilities with the planned acquisition of Lacework and its AI-based offerings. The companies announced the proposed deal Monday, with expectations…
Tips to prevent data breaches
Tips to Prevent Data BreachesCould the Ticketmaster Data Breach Been Prevented?In a recent regulatory filing to the US Securities And Exchange Commission (SEC) , Live Nation, the parent company of Ticketmaster, revealed a distressing development: a criminal threat actor attempted…
Criminal IP Unveils Innovative Fraud Detection Data Products on Snowflake Marketplace
Torrance, United States / California, 10th June 2024, CyberNewsWire The post Criminal IP Unveils Innovative Fraud Detection Data Products on Snowflake Marketplace appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Criminal…
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The Colorado Privacy Act (CPA), signed into law on July 7, 2021, is a comprehensive privacy legislation that aims to enhance data privacy rights for residents of Colorado. The CPA provides consumers with greater…
RSAC Fireside Chat: Jscrambler levels-up JavaScript security, slows GenAI-fueled privacy loss
Could we be on the verge of Privacy Destruction 2.0, thanks to GenAI? Related: Next-level browser security That’s a question that spilled out of a thought-provoking conversation I had with Pedro Fortuna, co-founder and CTO of Jscrambler, at … (more…)…
Utah Consumer Privacy Act (UCPA)
What is the Utah Consumer Privacy Act? The Utah Consumer Privacy Act, or UCPA, is a state-level data privacy law enacted in Utah, USA, aimed at providing residents with greater control over their personal data. The UCPA shares similarities with…
Identity Data Automation: The What and Why
A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The What and Why appeared first on The Cyber…