Less than a month after we at Contrast Security announced Application Detection and Response, it is already a finalist for a major cybersecurity award. The post Award Finalist: Contrast Security Application Detection and Response appeared first on Security Boulevard. This…
Category: Security Boulevard
Columbus Sues Expert, Fueling Debate About Ransomware Attack
City officials in Columbus, Ohio, filed a complaint against a cybersecurity expert who has been telling local media that the sensitive data stolen by the Rhysida group in a July ransomware attack poses a larger threat to residents and employees…
Randall Munroe’s XKCD ‘Sky Alarm’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2979/” rel=”noopener” target=”_blank”> <img alt=”” height=”302″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0992675d-5dfb-44f5-9f91-f17687c070a1/sky_alarm.png?format=1000w” width=”332″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Sky Alarm’ appeared first on Security Boulevard.…
Navigating new regulations and the role of SBOMs in software security
Recently in our webinar series with Amazon Web Services (AWS) and Fortify by OpenText™, our third installment, “The Power of SBOMs: Regulations Looming,” brought the panel together to discuss the evolving role of software bills of materials (SBOMs) amidst tightening…
USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level
Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim…
Snyk Allies With Snowflake to Improve Data Security
Snyk and Snowflake have allied to make it simpler for cybersecurity teams to analyze the security posture of their IT environments using data hosted in the cloud. The post Snyk Allies With Snowflake to Improve Data Security appeared first on…
Why NTIA Support of Open-Source AI is Good for Security
A fully open model — one where the training data is available for inspection and modification — provides a means for addressing another threat: malicious or accidentally bad training data. The post Why NTIA Support of Open-Source AI is Good…
SaaS Security: Are You Moving Fast Enough?
The slow adoption of SaaS security could catch organizations off guard because SaaS operates at a different pace than traditional software. The post SaaS Security: Are You Moving Fast Enough? appeared first on Security Boulevard. This article has been indexed…
Is the “Network” Defendable?
Is the network defendable? This serious question is often conveniently left unasked because the answer is uncomfortable. On June 3, 1983, the day before I graduated from high school, MGM released the movie “War Games”. For those who never saw…
Top 5 CVEs and Vulnerabilities of August 2024: Key Threats and How to Respond
August has seen some of the most eye-opening vulnerabilities surface, catching the attention of security experts across the globe. These aren’t just numbers in a database, they represent real challenges… The post Top 5 CVEs and Vulnerabilities of August 2024:…
Qilin Ransomware Attack Used To Steal Chrome Browser Data
In the cyberthreat landscape, Qilin ransomware attack has recently been observed stealing credentials in Chrome browsers. Reports claim that these credentials are being acquired using a small set of compromised end points. In this article, we’ll cover how the attack…
TuxCare Completes FIPS 140-3 Certification for AlmaLinux 9.2 Kernel
PALO ALTO, Calif. – September 3, 2024 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it received a CMVP–validated certificate for the AlmaLinux 9.2 kernel and is now on the NIST Active list. TuxCare’s Extended…
Ubuntu Patches Multiple Vim Vulnerabilities
Recently, Canonical has released security updates to address multiple Vim vulnerabilities in Ubuntu 14.04 ESM. Ubuntu 14.04, codenamed “Trusty Tahr,” reached its end-of-life (EOL) on April 30, 2019. After this date, Canonical stopped providing official updates, including security patches, for…
WordPress Sites at Risk from WPML Flaw
WordPress is the most widely used content management system globally, with over 478 million of all websites are built on its platform, according to its developers. However, this widespread popularity also makes WordPress a prime target for malicious actors. Because of…
Introducing Goffloader: A Pure Go Implementation of an In-Memory COFFLoader and PE Loader
We are excited to announce the release of Goffloader, a pure Go implementation of an in-memory COFFLoader and PE loader. This tool is designed to facilitate the easy execution of Cobalt Strike BOFs and unmanaged PE files directly in memory…
The Role of Digital Adoption in Email Deliverability & Security
Reading Time: 5 min Secure your domain with our expert DMARC provider and management services. Enjoy seamless DMARC management, continuous monitoring, and tailored solutions. The post The Role of Digital Adoption in Email Deliverability & Security appeared first on Security…
Data Breaches for the Month August 2024
This month has been a challenging month for organizations worldwide as several high-profile data breaches occur and become headlines. These incidents have not only exposed sensitive information but also highlighted… The post Data Breaches for the Month August 2024 appeared…
DevOpsDays Birmingham AL 2024: Guardrails, Immutable Infrastructures, and Community
Explore highlights from DevOpsDays Birmingham 2024, featuring workshops, sessions, and community-driven discussions on empowering teams and doing it securely. The post DevOpsDays Birmingham AL 2024: Guardrails, Immutable Infrastructures, and Community appeared first on Security Boulevard. This article has been indexed…
Ubuntu Fixes Several Linux Kernel AWS Vulnerabilities
Several vulnerabilities in the Linux kernel have been identified, also affecting Amazon Web Services (AWS) systems. Canonical has released important security patches addressing these vulnerabilities. These flaws primarily involve race conditions and memory management errors, which can be exploited to…
Risk Register Templates: Enhancing Your Risk Management Strategy
In a world full of uncertainties, how do you keep your business risks in check? Today, we’re exploring risk register templates and how they can supercharge your risk management strategy. What is a Risk Register? First things first, let’s define…