Category: Security Boulevard

Early 2026 is Proving KasadaIQ’s AI Predictions

AI agents have moved from experimental to operational. Now security teams must verify agent identity, intent, and trust before automation becomes exploitation. The post Early 2026 is Proving KasadaIQ’s AI Predictions appeared first on Security Boulevard. This article has been…

NDSS 2025 – Translating C To Rust: Lessons From A User Study

Session 13D: Software Security: Code and Compiler Authors, Creators & Presenters: Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li (National University of Singapore), Prateek Saxena (National University of Singapore), Ashish Kundu (Cisco Research) PAPER…

APT37 Adds New Capabilities for Air-Gapped Networks

IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign, tracked as Ruby Jumper by ThreatLabz, APT37 uses Windows shortcut (LNK) files…

What to Know About the Notepad++ Supply-Chain Attack

The cybersecurity community is still grappling with a sobering realization: one of the most ubiquitous tools in the developer’s toolkit, Notepad++, was hiding a critical vulnerability for over six months. The post What to Know About the Notepad++ Supply-Chain Attack…

What is Polymorphic Malware?

Malware continues to evolve, becoming more sophisticated and harder to detect. One of the most challenging types is polymorphic malware — malicious software that constantly changes its code to evade detection by traditional security systems. In a world where cyber…

How the CISO’s Role is Evolving From Technologist to Chief Educator

Today’s CISO is a strategic leader responsible for risk communication, security culture, education, and executive alignment. Technical expertise remains essential, but influence, clarity, and leadership now define success. The post How the CISO’s Role is Evolving From Technologist to Chief Educator  appeared…

Is Your AppSec Program Truly Mature?

Learn how to build a high-maturity Application Security program with secure SDLC, developer-first practices, automated AppSec controls, practical threat modeling, runtime API protection, and meaningful security metrics. The post Is Your AppSec Program Truly Mature?  appeared first on Security Boulevard.…

AI-Driven Behavioral Heuristics for Quantum-Era Threat Detection

Explore how AI-driven behavioral heuristics and post-quantum security protect Model Context Protocol (MCP) deployments from advanced AI-age threats. The post AI-Driven Behavioral Heuristics for Quantum-Era Threat Detection appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

AI Shocks the Cybersecurity Market

  The cybersecurity market was jolted last week after Anthropic dropped a bombshell announcement. The company’s new AI Claude model identified 500 previously unknown high-risk vulnerabilities hidden in widely used software. That is not a minor milestone. It is a…

How does Agentic AI help you stay ahead in cybersecurity

The Role of Agentic AI in Modern Cybersecurity Are you exploring the future trends making waves in cybersecurity today? One transformative technology, Agentic AI, is reshaping how organizations manage Non-Human Identities (NHI) and Secrets Security Management, allowing businesses to stay…

Why are tech leaders excited about NHI in cybersecurity

What is Driving the Buzz Among Tech Leaders Over Non-Human Identities in Cybersecurity? Cybersecurity is evolving at an unprecedented pace, and amidst the dynamic shifts, Non-Human Identities (NHIs) have emerged as a pivotal component that tech leaders are increasingly excited…

How does Agentic AI deliver value in cloud-native security

What Drives the Need for Non-Human Identity Management in Cloud-Native Security? How are organizations managing the security risks associated with non-human identities (NHIs) in their cloud environments? With digital transformation advances, the complexity and quantity of machine identities surpass human…