We used Tonic Fabricate to generate a fully synthetic email corpus, then RL fine-tuned an open-source model against it. The result: it beat o3 on real Enron emails — without ever seeing a real email. The post Synthetic data is…
Category: Security Boulevard
Flipping the Script: The Premiere of ‘The Women in Security’ Documentary at RSAC
The cybersecurity industry has long grappled with a significant representation gap, but a new documentary premiering at RSAC 2026 is working to change the conversation. In this interview from Broadcast Alley, Techstrong Group’s Jon Swartz speaks with Aarti Gadhia and…
Axios Compromise on npm Introduces Hidden Malicious Package
A newly discovered software supply chain attack targeting the npm ecosystem briefly compromised one of the most widely used JavaScript libraries in the world. The post Axios Compromise on npm Introduces Hidden Malicious Package appeared first on Security Boulevard. This…
BSidesSLC 2025 – Atomic Honeypot – A MySQL Honeypot That Fights Back
Author, Creator & Presenter: Alexander Rubin – Principal Security Engineer And RDS Red Team Lead At AWS Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post…
Bridging the Gap: CSA’s AI Security Initiatives at RSAC
Alan Shimel sits down with longtime friend and cybersecurity veteran Rich Mogull to discuss his new role as chief analyst at the Cloud Security Alliance. The conversation covers a lot of ground, from the rapid rise of agentic AI to…
Supply chain attack on Axios npm package: Scope, impact, and remediations
The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft, including the loss…
Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions
Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions The post Axios Hijacked: npm Account Takeover Deploys Cross-Platform RAT to Millions appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Axios…
2026 SANS Identity Threats Report: Why Attacks Still Work
SANS findings highlight the real issue, compromised credentials enable access long before traditional security controls detect a problem. The post 2026 SANS Identity Threats Report: Why Attacks Still Work appeared first on Security Boulevard. This article has been indexed from…
Beyond the Spectacle – RSAC 2026 and The 5 Layers of AI Security – FireTail Blog
Mar 31, 2026 – Jeremy Snyder – If you were at RSA Conference last year, you probably remember the goats. Or the puppies. Or the miniature petting zoos. It was a year of “over-the-top” spectacle. A bit of a circus,…
Latest Xloader Obfuscation Methods and Network Protocol
Introduction Xloader is an information stealing malware family that evolved from Formbook and targets web browsers, email clients, and File Transfer Protocol (FTP) applications. Additionally, Xloader may execute arbitrary commands and download second-stage payloads on an infected system. The author of…
Between AI Urgency and AI Fatigue at RSAC 2026
AI was everywhere at RSAC 2026, but the real focus was operational security: managing agents, protecting secrets, and controlling trusted integrations at scale. The post Between AI Urgency and AI Fatigue at RSAC 2026 appeared first on Security Boulevard. This…
BSidesSLC 2025 – Considering Cloud Coverage In SIEM/XDR Design
Author, Creator & Presenter: Chris Beckman – Principal Security Engineer at TaxBit Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – Considering Cloud…
Is Your Repository Ready for What’s Next?
Most software teams don’t start out planning to adopt an enterprise artifact repository. The post Is Your Repository Ready for What’s Next? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Is…
Passkeys vs Bots: Do They Really Solve the Human Verification Problem?
Passkeys secure authentication but do not prove users are human. Learn how bots operate after login and why modern apps need bot detection, behavioral analysis, and runtime identity. The post Passkeys vs Bots: Do They Really Solve the Human Verification…
TCP vs UDP: Difference, Examples, Future
Introduction When it comes to sending data over the internet, two main protocols dominate the landscape: TCP, which stands for Transmission Control Protocol, and UDP stands for User Datagram Protocol. These protocols are important since they determine how information is…
Change Intelligence and Deployment Connectors for Liquibase Secure
Liquibase Secure introduces Change Intelligence and Deployment Connectors for ServiceNow, GitHub, Harness, and Terraform to improve database change governance and visibility. The post Change Intelligence and Deployment Connectors for Liquibase Secure appeared first on Security Boulevard. This article has been…
Let’s Stop Sovereignty Washing
Don’t fall for “sovereignty washing.” Learn the technical difference between data residency and true digital sovereignty, the impact of the U.S. CLOUD Act, and the rise of European “Geopatriation.” The post Let’s Stop Sovereignty Washing appeared first on Security Boulevard. This…
California Gets Serious About Regulation (Again)
California’s privacy regime has evolved. As of January 1, 2026, the CCPA/CPRA now mandates risk assessments, automated decision-making (AI) oversight, and independent cybersecurity audits. The post California Gets Serious About Regulation (Again) appeared first on Security Boulevard. This article has…
The Quantum Clock is Ticking and Your Encryption is Running Out of Time
With 90% of organizations unprepared for quantum threats, the shift to post-quantum cryptography (PQC) is a structural necessity. Explore the “harvest now, decrypt later” risk and the NIST PQC standards. The post The Quantum Clock is Ticking and Your Encryption is Running…
Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install
See how the attack works, what to look for, and how to remediate. The post Poisoned Axios: npm Account Takeover, 50 Million Downloads, and a RAT That Vanishes After Install appeared first on Security Boulevard. This article has been indexed…