Category: Security Boulevard

N. Korean Threat Groups Mixing Tactics to Evade Detection

Researchers with Google-owned Mandiant last month wrote about increasing collaboration among North Korea-supported threat groups as one indication of a larger evolution of the regime’s offensive cyber program. The half-dozen or so state-sponsored cyberthreat groups associated with North Korea have…

5 Security Risks of Responsive Web Design

The very features that make responsive web design (RWD) so flexible can also introduce new security vulnerabilities if not properly managed. The post 5 Security Risks of Responsive Web Design appeared first on Security Boulevard. This article has been indexed…

Strata Identity’s Maverics Achieves SOC 2 Type II Certification

MEDIA ADVISORY Standard Validates that Maverics Identity Orchestration Meets the Highest Standards for Security, Availability, and Confidentiality  BOULDER, Colo., Nov.29, 2023 – Strata Identity, the Identity Orchestration company, today announced that the Maverics Identity Orchestration Platform™ received a System and…

Web Security 101 – Best Practices and Solutions

Web security is an umbrella term for internet security which includes website security – the practice of safequaring your website against attacks. The post Web Security 101 – Best Practices and Solutions appeared first on Security Boulevard. This article has…

Intel Reptar Flaw Patch For CPU Vulnerability Released

Intel recently released multiple fixes for a high-severity vulnerability dubbed Reptar. The CVE-2023-23583 has a CVSS score of 8.8 and, when exploited, has the potential for privilege escalation, information disclosure, and a denial of service (DoS) condition. The Intel Reptar…

The Transition to CVSS v4.0 – What You Need to Know

The Forum of Incident Response and Security Teams (FIRST) has officially released version 4.0 of the Common Vulnerability Scoring System (CVSS). This new version comes four years after the release of CVSS v3.1. It marks a significant evolution in the…

Several Cobbler Vulnerabilities Fixed in Ubuntu 16.04

A series of Cobbler vulnerabilities have been addressed in Ubuntu 16.04 ESM in the recent security updates. Ubuntu 16.04 ESM (Expanded Security Maintenance) is the extended version of end-of-life Ubuntu 16.04 LTS with extra security patching beyond the end dates.…

Webinar: Best Practices for Security Compliance

Join our upcoming webinar with DevSecOps expert, Wilson Mar, and learn how to turn compliance into a strategic advantage for your organization. The post Webinar: Best Practices for Security Compliance appeared first on Security Boulevard. This article has been indexed…

KubeCon 2023: Bridging the AppSec Tools Gap

Alan Shimel: Hey everyone, it’s Alan Shimel, Tech Strong TV, and we’re back here live at KubeCon in the windy city of Chicago. It wasn’t that windy out. It was actually pretty warm this morning. I thought it was going…

NIST CSF 2.0: Changes and Implications

In August 2023, the National Institute of Standards and Technology (NIST) released a draft version of NIST Cybersecurity Framework (CSF) 2.0. This impending update to the popular cybersecurity guidance brings some significant changes. The document closed for public comment on…

KubeCon 2023: Briding the AppSec Tools Gap

Alan Shimel: Hey everyone, it’s Alan Shimel, Tech Strong TV, and we’re back here live at KubeCon in the windy city of Chicago. It wasn’t that windy out. It was actually pretty warm this morning. I thought it was going…

SEO Poisoning Brings Users to Attackers’ Doors

Using black hat SEO to achieve high rankings for particular search terms, threat actors can sit back as victims flock to their malware-infected websites. The post SEO Poisoning Brings Users to Attackers’ Doors appeared first on Ericom Software. The post…