Category: Security Boulevard

Axios Compromise on npm Introduces Hidden Malicious Package

A newly discovered software supply chain attack targeting the npm ecosystem briefly compromised one of the most widely used JavaScript libraries in the world. The post Axios Compromise on npm Introduces Hidden Malicious Package appeared first on Security Boulevard. This…

2026 SANS Identity Threats Report: Why Attacks Still Work

SANS findings highlight the real issue, compromised credentials enable access long before traditional security controls detect a problem. The post 2026 SANS Identity Threats Report: Why Attacks Still Work appeared first on Security Boulevard. This article has been indexed from…

Latest Xloader Obfuscation Methods and Network Protocol

Introduction Xloader is an information stealing malware family that evolved from Formbook and targets web browsers, email clients, and File Transfer Protocol (FTP) applications. Additionally, Xloader may execute arbitrary commands and download second-stage payloads on an infected system. The author of…

Between AI Urgency and AI Fatigue at RSAC 2026

AI was everywhere at RSAC 2026, but the real focus was operational security: managing agents, protecting secrets, and controlling trusted integrations at scale. The post Between AI Urgency and AI Fatigue at RSAC 2026 appeared first on Security Boulevard. This…

BSidesSLC 2025 – Considering Cloud Coverage In SIEM/XDR Design

Author, Creator & Presenter: Chris Beckman – Principal Security Engineer at TaxBit Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – Considering Cloud…

Is Your Repository Ready for What’s Next?

Most software teams don’t start out planning to adopt an enterprise artifact repository. The post Is Your Repository Ready for What’s Next? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Is…

TCP vs UDP: Difference, Examples, Future

Introduction When it comes to sending data over the internet, two main protocols dominate the landscape: TCP, which stands for Transmission Control Protocol, and UDP stands for User Datagram Protocol. These protocols are important since they determine how information is…

Change Intelligence and Deployment Connectors for Liquibase Secure

Liquibase Secure introduces Change Intelligence and Deployment Connectors for ServiceNow, GitHub, Harness, and Terraform to improve database change governance and visibility. The post Change Intelligence and Deployment Connectors for Liquibase Secure appeared first on Security Boulevard. This article has been…

Let’s Stop Sovereignty Washing

Don’t fall for “sovereignty washing.” Learn the technical difference between data residency and true digital sovereignty, the impact of the U.S. CLOUD Act, and the rise of European “Geopatriation.” The post Let’s Stop Sovereignty Washing  appeared first on Security Boulevard. This…

California Gets Serious About Regulation (Again)

California’s privacy regime has evolved. As of January 1, 2026, the CCPA/CPRA now mandates risk assessments, automated decision-making (AI) oversight, and independent cybersecurity audits. The post California Gets Serious About Regulation (Again) appeared first on Security Boulevard. This article has…