Category: Security Boulevard

Apple Seeks to Drop Its Lawsuit Against Spyware Maker NSO

Apple wants its three-year-old lawsuit against spyware maker NSO to be dismissed, citing the surveillance software maker’s declining dominance of the expanding market and fears that its own threat intelligence could be exposed, which would harm its efforts to protect…

DORA Compliance Checklist: From Preparation to Implementation

Learn how to navigate the DORA compliance checklist and meet DORA cybersecurity regulation requirements with our step-by-step guide. The post DORA Compliance Checklist: From Preparation to Implementation appeared first on Scytale. The post DORA Compliance Checklist: From Preparation to Implementation…

Why Are So Many Public Sector Organizations Getting Attacked?

Public sector organizations such as schools, hospitals, manufacturing units, essential services and government offices have become a popular target for cybercriminals. The post Why Are So Many Public Sector Organizations Getting Attacked? appeared first on Security Boulevard. This article has…

Unlock FCC Pilot Program Funding with Cloud Monitor and Content Filter

Maximize Your District’s Application Success: How ManagedMethods Qualifies for the Identity Protection and Authentication Category We recently hosted a live webinar that discusses what you need to know about the FCC School and Libraries Cybersecurity Pilot Program. This webinar outlines…

The Rise of AI Voicemail Scams, Political Donation Privacy Concerns

In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites. Additionally, we celebrate the 15th…

SquareX: The Future of BYOD Security for Enterprises

Convert the Browsers on BYOD / Unmanaged Devices into Secure Browsing Sessions As modern enterprises continue to adapt to the flexible work culture, Bring Your Own Device (BYOD) policies have become a standard practice. However, protecting sensitive corporate data while maintaining…

Fundamentals of GraphQL-specific attacks

GraphQL vs REST APIs Developers are constantly exploring new technologies that can improve the performance, flexibility, and usability of applications. GraphQL is one such technology that has gained significant attention for its ability to fetch data efficiently. Unlike the traditional REST…

USENIX Security ’23 – Security Analysis of MongoDB Queryable Encryption

Authors/Presenters:Zichen Gui, Kenneth G. Paterson, Tianxin Tang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via…

Randall Munroe’s XKCD ‘Monocaster’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2983/” rel=”noopener” target=”_blank”> <img alt=”” height=”673″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/d6d46307-0dbb-42b6-9d46-ab12d107684e/monocaster.png?format=1000w” width=”536″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Monocaster’ appeared first on Security Boulevard. This…

Realm.Security Emerges to Tackle Cybersecurity Data Management

Realm.Security has launched a platform for collecting and normalizing cybersecurity telemetry data that promises to streamline analytics. The post Realm.Security Emerges to Tackle Cybersecurity Data Management appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Live Patching as a Growth Enabler for Your Infrastructure

Yesterday, as I was preparing this article, I had the opportunity to present at a TuxCare webinar, where we introduced live patching. Throughout the presentation, we discussed various characteristics of this patching methodology. While reflecting on these aspects, I realized…

Application Security — The Complete Guide

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software. The post Application Security — The Complete Guide appeared first on Security Boulevard. This article has been indexed from Security…

Comprehensive Guide to Infrastructure Robustness Metrics

Infrastructure robustness is critical for ensuring the resilience and reliability of your systems. This comprehensive guide explores key metrics used to assess and improve infrastructure robustness. The post Comprehensive Guide to Infrastructure Robustness Metrics appeared first on Security Boulevard. This…

Randall Munroe’s XKCD ‘Water Filtration’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2982/” rel=”noopener” target=”_blank”> <img alt=”” height=”467″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/387450f7-0c5b-4e62-85be-87148f628a01/water_filtration.png?format=1000w” width=”593″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Water Filtration’ appeared first on Security Boulevard.…

Blocking in Production Requires a Modern Security DevEx | Impart Security

< div class=”blog-post4-content_component margin-top”> < div class=”blog-post4-content_content”> < div class=”text-rich-text w-richtext”> Blocking in Production Requires a Modern Security DevEx I’ve spoken to many security leaders who are genuinely scared of blocking in production. And I totally get it – blocking…

How to Strengthen and Improve Your Company’s Security Posture

Maintaining security posture is key to protecting organizations against cyberattacks. Here’s how to improve your security posture and keep your business safe.  The post How to Strengthen and Improve Your Company’s Security Posture appeared first on Security Boulevard. This article…

The SBOM has a long history — but what’s next is what matters

Software bills of materials (SBOMs) are having their day — they’re even government-mandated at times. In September 2023, the U.S. Food and Drug Administration issued its final version of “Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket…

Tines Leverages LLMs to Simplify Security Automation

Tines today added an artificial intelligence (AI) chat interface to its no-code platform for automation cybersecurity workflows. The post Tines Leverages LLMs to Simplify Security Automation appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

US Elections: Iranian Hackers Target Political Campaigns

With elections, there have always been accusations of rigging and corruption and it’s possible that such claims may hold some truth in different countries worldwide. However, the US elections have recently been subjected to the influence of cybercrime. Such a…

Ubuntu 24.04.1 LTS Released: This is What’s New

Canonical’s Ubuntu 24.04 LTS, codenamed “Noble Numbat” has received its first major update: Ubuntu 24.04.1. This release, which arrived a bit later than initially planned due to some high-impact bugs, brings a host of improvements and enhancements to the popular…

BYOD Policies Fueling Security Risks

The use of employee mobile devices at work, or bring your own device (BYOD), is a significant and growing threat to organizational security. The post BYOD Policies Fueling Security Risks appeared first on Security Boulevard. This article has been indexed…

Vulnerability handling requirements for NIS2 compliance

In a previous blog post, we covered two foundational elements of the Network and Information Security (NIS2) Directive, software supply chain security and reporting requirements. In this blog, we take a closer look at the types of organizations impacted by…

Navigating the Risks of Namespace Collision: A Critical Security Challenge

In today’s digital landscape, organizations face a multitude of cybersecurity threats, one of which is the often-overlooked issue of namespace collision. This vulnerability arises when internal domain names conflict with newly registered top-level domains (TLDs), exposing sensitive data to potential…

Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS

Week B: Bugs begone! This month Redmond fixes 79 security flaws in Windows and other products The post Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS appeared first on Security Boulevard. This article has been indexed from Security…

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated Active Directory Certificate Services (ADCS) objects into BloodHound and demonstrated how to effectively use BloodHound to identify attack paths, including the ESC1 domain escalation…

6 Questions to Answer Before Choosing an Identity Provider

Choosing the right identity provider is crucial, as it requires architectural changes that can make switching later difficult and costly. The post 6 Questions to Answer Before Choosing an Identity Provider appeared first on Security Boulevard. This article has been…

Manufacturing, Industrial Sectors Are Under Siege

Manufacturing and industrial sectors are becoming bigger cyber-targets, and many of the intrusions are coming from China. Those are among the sobering takeaways from a report Tuesday by Ontinue’s Advanced Threat Operations team in its biannual Threat Intelligence Report. The…

USENIX Security ’23 – Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis

Authors/Presenters:Junzhe Wang, Matthew Sharp, Chuxiong Wu, Qiang Zeng, Lannan Luo Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim…

Just-in-Time Access: Key Benefits for Cloud Platforms

Just-in-time access has emerged as a game-changing approach to enhance the security posture of cloud environments. This innovative method aligns with the principle of least privilege, reducing the attack surface and minimizing potential security risks. The post Just-in-Time Access: Key…

AI-Powered Deepfake Scams Wreak Havoc on Businesses

More than half (53%) of businesses in the U.S. and UK have been targeted by financial scams using deepfake technology, with 43% of those companies falling victim, according to a Medius survey of 1,533 finance professionals. The post AI-Powered Deepfake…

Legal Impact of GDPR Data Policy Violations

GDPR violations can result in severe consequences. In its first year, over 89,000 data breaches were reported, leading to fines totaling €56 million. In 2019, the UK’s Information Commissioner’s Office (ICO) imposed record fines on British Airways (€183 million) and…

Eclypsium Product Roadmap

Join Eclypsium Product Manager, Joe Hopp, for an overview of new product updates and a preview of the features and solutions on the Eclypsium Supply Chain Security Platform roadmap. The post Eclypsium Product Roadmap appeared first on Eclypsium | Supply…

Why Investing in Quality Analysts is Investing in Your Future

In a rapidly evolving marketplace, the quality of your products and services directly impacts your company’s longevity and success. By investing in the services of…Read More The post Why Investing in Quality Analysts is Investing in Your Future appeared first…

Randall Munroe’s XKCD ‘Slingshots’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2981/” rel=”noopener” target=”_blank”> <img alt=”” height=”420″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/569a573c-5093-4fc6-8070-0a82a0cdea73/slingshots.png?format=1000w” width=”397″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Slingshots’ appeared first on Security Boulevard. This…

FIPPA: Understanding Canada’s Information and Protection Privacy Law

In today’s data-driven world, protecting personal information and the right to access government records are fundamental to ensuring transparency and privacy. Canada’s Freedom of Information and Protection of Privacy Act (FIPPA) is a key piece of legislation that balances these…

USENIX Security ’23 – BunnyHop: Exploiting the Instruction Prefetcher

Authors/Presenters:Zhiyuan Zhang, Mingtian Tao, Sioli O’Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at…

Meet Nutron: Your AI-Driven Ally in Proactive Cyber Defense

Imagine you’re part of a cybersecurity team that just received an alert about a potential breach. The clock is ticking, and your team is flooded with data and alerts from multiple sources. Sorting through this overwhelming volume of information to…

Redefining Cyber Defense: Introducing the Nuspire Cybersecurity Experience

In an era where digital threats evolve at breakneck speed, organizations need an integrated cybersecurity solution to stay ahead. The cybersecurity landscape has become increasingly complex, with attackers employing sophisticated techniques that can easily overwhelm traditional security measures. Enter Nuspire,…

The Foundation of Zero-Trust Security Architecture

For today’s IT organizations, establishing a zero-trust (ZT) architecture is an ongoing process of refinements for existing networks, resources, methods and security capabilities. The post The Foundation of Zero-Trust Security Architecture appeared first on Security Boulevard. This article has been…

Security Budget Growth Slows, but Spending Remains Elevated

The expansion of security budgets has slowed, indicating the end of rapid growth in the sector, according to a survey of 755 CISOs. The post Security Budget Growth Slows, but Spending Remains Elevated appeared first on Security Boulevard. This article…

Protecting NATO Secret and Foreign Government Information

We’ve talked a lot on this blog about protecting controlled unclassified information, and we’ve mentioned in places some other kinds of information, like classified and secret information, covered defense information, and other protected information. There’s one thing all of this…

Talking DSPM: Episode 4 – Dr. Mohit Tiwari

I’m Mohit Tiwari. I’m one of the co-founders of Symmetry Systems, and the CEO. Symmetry was spun out of Spark… The post Talking DSPM: Episode 4 – Dr. Mohit Tiwari appeared first on Symmetry Systems. The post Talking DSPM: Episode…

Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option

Gary Perkins, Chief Information Security Officer In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this approach, providing both technological protection and financial assurance. The…

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing legitimate security software tools to run cyber campaigns against organizations. The post Threat Actors Abuse Red Team Tool MacroPack to…

Russian ‘WhisperGate’ Hacks: 5 More Indicted

Eaten by a GRU: Fake ransomware created by Russian GRU Unit 29155 attacked Ukraine and NATO—a month before the full scale invasion. The post Russian ‘WhisperGate’ Hacks: 5 More Indicted appeared first on Security Boulevard. This article has been indexed…

Why and How to Secure GenAI Investments From Day Zero

A healthy approach to GenAI is one in which organizations build security protections from the start. Here are tips on how to integrate security into your organization’s GenAI strategy from day zero. The post Why and How to Secure GenAI…

Frustration Trying to Opt-Out After the National Public Data Breach

  The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine. As a California resident, I have the legal right to demand that they delete my…

Overcoming the Challenges of Zero-Trust

Zero-trust, rooted in the principle of “never trust, always verify,” requires organizations to assume that every access request, whether internal or external, is potentially harmful. The post Overcoming the Challenges of Zero-Trust appeared first on Security Boulevard. This article has…

Why Are Organizations Losing the Ransomware Battle?

Axio Senior Cybersecurity Advisor, Richard Caralli’s recent article in Dark Reading, Why Are Organizations Losing the Ransomware Battle? examines the growing problem of ransomware attacks, emphasizing that many organizations are Read More The post Why Are Organizations Losing the Ransomware…

Randall Munroe’s XKCD ‘Lava Lakes’

<img alt=”” height=”272″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/5809f07f-b360-4679-a97e-feca717b5905/lava_lakes.png?format=1000w” width=”709″ /><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Lava Lakes’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Managing Certificate Chaos After Google’s Entrust Distrust

When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it unleashed an operational crisis for many organizations. If your business uses Entrust TLS certificates, you are facing one of two realities right…

An Introduction to Trackers and the Data They Collect

Trackers are everywhere and come in many different forms. Some tracking methods are more invasive than others; this post aims to explain what “trackers” are, how they work, and give examples of the data they collect. TABLE OF CONTENTS A…

BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar

IntroductionIn June 2024, Zscaler ThreatLabz detected fresh activity from BlindEagle, an advanced persistent threat (APT) actor also identified as AguilaCiega, APT-C-36, and APT-Q-98. BlindEagle predominantly focuses on organizations and individuals from the government and finance sector in South America, particularly…

Storage & Data Protection Trends & Innovations To Watch in 2025

It’s all about the data.  One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. And from The post Storage & Data Protection Trends & Innovations To Watch in 2025 appeared…

RansomHub Emerges in Rapidly Evolving Ransomware Landscape

The ransomware space is becoming increasingly fragmented in the wake of law enforcement actions against BlackCat, LockBit, and others, spawning more threat groups and giving rise to prolific newcomers like RansomHub, according to a report by Searchlight Cyber. The post…