Generative AI engines similar to OpenAI’s ChatGPT and Google’s Bard will become indispensable tools for enterprises and cybersecurity operations in detecting and analyzing malicious code in a real-world environment, according to researchers with crowdsourced threat intelligence platform VirusTotal. The Google-owned…
Category: Security Boulevard
Stressed Employees and Insider Threats Put Data in Danger
The majority of data breaches involved the human element, a catchall term for company insiders who compromise company and customer data. The post Stressed Employees and Insider Threats Put Data in Danger appeared first on Security Boulevard. This article has…
Security Pros See Budget Bump, Headcount Rise in 2023
Increased budgets and team sizes within security departments are giving IT pros a boost despite the prevailing economic challenges in 2023. The post Security Pros See Budget Bump, Headcount Rise in 2023 appeared first on Security Boulevard. This article has…
Navigating Rogue Waves; Balancing Privacy and Security
This Article Navigating Rogue Waves; Balancing Privacy and Security was first published on Signpost Six. | https://www.signpostsix.com/ Introduction In 2013, Edward Snowden leaked over 200,000 classified National Security Agency documents concerning widespread government surveillance practices. This propelled a debate on…
Insider Risk Digest: Week 47-48
This Article Insider Risk Digest: Week 47-48 was first published on Signpost Six. | https://www.signpostsix.com/ Introduction Every two weeks, we bring you a round-up of cases and stories that caught our attention in the realm of Insider Risk. For weeks…
How can Cloud Security Prevent Exposure of Credentials via File Sharing App?
Do you know 76% of organizations are concerned about their cloud security? The seamless exchange and management of files stand as a key for businesses and individuals alike. Nevertheless, new information has highlighted serious vulnerabilities in a well-known file sharing…
Prepare, Prevent, and Response: A Comprehensive Ransomware Protection Guide
Rampant Ransomware Attacks On November 8, 2023, U.S. Eastern Time, ICBC Financial Services (FS), the U.S. arm of China’s largest bank, fell victim to a ransomware attack, disrupting certain systems. Reports indicate that the attack, linked to a Citrix vulnerability…
DEF CON 31 – Maxime Clementz’ ‘Defeating VPN Always On’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Holiday Season Cyberattacks: What to Watch Out For
The festive cheer of mid-November and December often extends to opportunistic threat actors who use this time of year to catch companies and people off guard. The holiday season usually sees an increase in several types of cyber threats, and…
Trend Micro Adds AI Tool While Extending CNAPP Reach
Trend Micro’s generative AI tool, Trend Companion, leverages natural language to reduce toil by bringing context to alerts and reducing incident investigation times. The post Trend Micro Adds AI Tool While Extending CNAPP Reach appeared first on Security Boulevard. This…
CISA: Threat Groups are Targeting Unitroncis PLCs in Water Systems
The United States’ top cybersecurity agency is warning that hackers are targeting a particular tool used by water and wastewater system operators around the country, noting an attack the day after Thanksgiving on a water utility in Pennsylvania. The Cybersecurity…
Black Basta Extortion Group Racks Up $107 Million in Ransom Payments
Anyone who wonders why the threat of ransomware continues to grow need only to take a look at Black Basta, the prolific extortion gang that last year likely rose from the ashes of the high-profile Russian group Conti. Black Basta…
The Elephant in AppSec Podcast⎥Lack of effective DAST tools⎥Aleksandr Krasnov (Meta, Thinkific, Dropbox)
Welcome to the first episode of The Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec Elephants in the room. The post The Elephant in AppSec Podcast⎥Lack of effective DAST tools⎥Aleksandr Krasnov (Meta, Thinkific, Dropbox) appeared…
What Is The Cyber Kill Chain? Process & Model
Grasping the Fundamentals: A Study of the Cyber Harm Ladder Navigating the multifaceted universe of cybersecurity is similar to solving an evolving labyrinth. This world is awash with intricate principles and techniques; with the Cyber Harm Ladder gaining increasing focus…
Different Types of CISOs, Diverse Missions
There are a range of distinct roles/missions that hold the CISO title. Their ultimate goals are similar, but how they are positioned to do that varies. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard. This…
DarkCasino WinRAR Exploit: A New APT Threat Emerges
In a recent cybersecurity revelation, a formidable and highly sophisticated cyber threat has surfaced, going by the name DarkCasino. Initially perceived as a phishing campaign orchestrated by the EvilNum group, recent analyses by cybersecurity firm NSFOCUS have reclassified DarkCasino as…
AlmaLinux Under the Hood: Key Features Every System Administrator Should Know
System administrators face the continuous challenge of ensuring reliability, security, and efficiency in their IT environments. One solution that is increasingly gaining traction is AlmaLinux. This open-source enterprise-level Linux distribution is tailored to meet the demanding needs of system administrators…
Detecting AiTM Phishing Sites with Fuzzy Hashing
Background In this blog, we will cover how Obsidian detects phishing kits or Phishing-as-a-Service (PhaaS) websites for our customers by analyzing the fuzzy hashes of visited website content. This concept draws from prior industry art, as IOCs (ex: SHA-1/SHA-265) and…
Strengthening Cybersecurity to Enhance Compliance: The Splunk and CrowdStrike Advantage
In today’s digital age, businesses constantly face unprecedented cybersecurity challenges. The ever-evolving threat landscape, stringent regulatory requirements, and the growing volume of sensitive data make safeguarding your organization’s data a top priority. Fortunately, you can leverage advanced cybersecurity solutions to…
“Known Good” or “Known Bad”: Choosing a Starting Point for OT Cybersecurity
One way to characterize a cybersecurity strategy is by whether it takes action based on the definition of “known good” activity or “known bad” activity. The “known bad” approach attempts to identify threats by monitoring activity (network requests, user actions,…