Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm…
Category: Security Boulevard
Best Practices for Identity Proofing in the Workplace
With employee identity risk and fraud on the rise — to the point that the FBI has issued a public warning — it’s crucial to ensure that employees are who they say they are. Is the person you interviewed the…
2023 Cyber Review: The Year GenAI Stole the Show
This was a year unlike any other in the brief history of the cybersecurity industry, with generative artificial intelligence disrupting plans and ushering in unparalleled change to security. The post 2023 Cyber Review: The Year GenAI Stole the Show appeared…
The SOC 2 Compliance Checklist for 2023
SOC 2 is the gold standard in Information Security certifications and shows the world just how seriously your company takes Information Security. An incredible way to systematically evaluate and improve your company’s handling of customer data throughout its lifecycle, the…
Navigating an AI-Enhanced Landscape of Cybersecurity in 2024: A Proactive Approach to Phishing Training in Enterprises
As we stand at the precipice of 2024, the intersection of artificial intelligence (AI) and cybersecurity looms large, with phishing attacks emerging as a focal point of concern. The integration of AI is poised to redefine the threat landscape, introducing…
DEF CON 31 XR Village – Whitney Phillips’ ‘Augmented Reality And Implications On Mobile Security’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals
In episode 307, Tom and Scott debunk misinformation circulating about the iOS 17 NameDrop feature by law enforcement and others on social media. Next, they discuss the potential risks of QR code scams, detailing a real-life incident where a woman…
DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An Exploit Chain From Public Keys To Microsoft Bug Bounty’
DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An…
WTH is Modern SOC, Part 1
In recent weeks, coincidentally, I’ve had several conversations that reminded me about the confusion related to “modern SOC.” Some of them were public (example and example), while others private. One particular person went on a quest through several “leading” companies’…
The Endless Pursuit of the Ecosystem
It isn’t possible to fully understand the cybersecurity ecosystem, but it’s the only motivation you need to keep trying. The post The Endless Pursuit of the Ecosystem appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan
TA446’s new TTPs: “Star Blizzard” FSB team called out by Five Eyes governments (again). The post Russian FSB Targets US and UK Politicians in Sneaky Spear-Phish Plan appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Trojan Malware Hidden in Cracked macOS Software, Kaspersky Says
Newly discovered cracked applications being distributed by unauthorized websites are delivering Trojan-Proxy malware to macOS users who are looking for free or cheap versions of the software tools they want. The malware can be used by bad actors for a…
Fighting the Next Generation of Fraud
The introduction of generative AI has been a game changer for fraudsters, transforming ordinary schemes into highly sophisticated efforts. The post Fighting the Next Generation of Fraud appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Identity Fraud Rises as E-Commerce, Payment Firms Targeted
Fraud incidents are on the rise, largely attributed to the surge in impersonation fraud and the accessibility of sophisticated attack methods and tools. The post Identity Fraud Rises as E-Commerce, Payment Firms Targeted appeared first on Security Boulevard. This article…
Importance of Web Application Security Testing: Exploring Vulnerabilities in Web Apps
Nearly 98% of web applications face vulnerabilities that could lead to malware infections, redirects to harmful sites, and other security risks. Protecting your data is paramount to shield your business from malicious intent. Web application security testing acts as a…
Preventing PII Leakage through Text Generation AI Systems
Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into giving you information that was supposed to be…
Welltok Data Breach: 8.5M US Patients’ Information Exposed
In a recent cybersecurity incident, Welltok, a leading healthcare Software as a Service (SaaS) provider, reported unauthorized access to its MOVEit Transfer server, affecting the personal information of approximately 8.5 million patients in the United States. Discovered on July 26,…
Eclypsium Helps Florida Law Enforcement Agencies Achieve CJIS Compliance
Recent Criminal Justice Information Services (CJIS) regulations have introduced stringent new rules that define how law enforcement agencies must protect criminal justice information (CJI). These changes require agencies to manage risk, vulnerabilities, and threats down to the firmware within their…
How Data Ingestion Works in SOAR
SOAR tools work as consolidation platforms for security alerts and incident response. Endpoint security tools, network security tools, email systems, and other tools collect logs, run detection rules and generate alerts. SOAR then ingests those alerts so teams can work…
DEF CON 31 – Dan Petro’s, David Vargas’ ‘Badge Of Shame Breaking Into Secure Facilities With OSDP’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…