Category: Security Boulevard

Tensorflow Supply Chain Compromise via Self-Hosted Runner Attack

Introduction With the recent rise and adoption of artificial intelligence technologies, open-source frameworks such as TensorFlow are prime targets for attackers seeking to conduct software supply chain attacks. Over the last several years, Praetorian engineers have become adept at performing…

3 Things to Ensure your start-up’s success

Execution is a fundamental component of success for any organization. Companies that struggle to execute effectively often face challenges and miss out on opportunities, and I would argue that execution.. The post 3 Things to Ensure your start-up’s success appeared…

Who’s Behind GoatRAT?

In this brief analysis I’ll take a look at who’s behind GoatRAT in terms of social media activity C&C servers and actual personally identifiable information. Personally identifiable information: hxxp://bit[.]ly/nubankmodulo hxxp://goatrat[.]com/apks/apk20[.]apk Sample MD5s: 6583a9b6b83738e0bf2a261fc04483e18772da3241e467fdef37a8e27b1869a7 9a8e85cf1bbd32c71f0efa42ffedf1a0 hxxp://api[.]goatrat[.]com:3008 Social Media: hxxp://t[.]me/sickoDevz hxxp://t[.]me/goatmalware Web site: …

Randall Munroe’s XKCD ‘Like This One’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2879/”> <img alt=”” height=”464″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/9cac31b1-913b-4d86-84f0-1f7c89d68a7f/like_this_one.png?format=1000w” width=”273″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Like This One’ appeared first on Security Boulevard.…

Ivanti VPN Zero-Day Combo Chained ‘by China’

Under active exploitation since last year—but still no patch available. The post Ivanti VPN Zero-Day Combo Chained ‘by China’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Ivanti VPN Zero-Day Combo Chained ‘by…

The State of Open Source Cloud-Native Security

As 2024 kicks off, here’s where cloud-native supply chain security stands and what to expect in the immediate future. The post The State of Open Source Cloud-Native Security appeared first on Security Boulevard. This article has been indexed from Security…

Three Tips To Use AI Securely at Work

How can developers use AI securely in their tooling and processes, software, and in general? Is AI a friend or foe? Read on to find out. The post Three Tips To Use AI Securely at Work appeared first on Security…

Why is my SSL expiring every 3 months?

Digital certificates, used with the protocol ‘TLS’ (Transport Layer Security, previously known as ‘SSL’ or Secure Socket Layers) establish secure connections between your web server and the browsers visitors use to view your site. They ensure the user’s browser regards…

Application Security Testing (AST) Explained

The typical global enterprise has over 12,000 web-based applications, including APIs, SaaS applications, servers, and databases. While these applications play a vital role in driving efficiency, productivity, innovation, and overall business success, they also represent an incredible security risk. In…