Category: Security Boulevard

CapraRAT Spyware Masks As Popular Android Apps

In the realm of cybercrime, a threat actor by the name of Transparent Tribe is rapidly spreading the CapraRAT spyware by disguising it as popular Android apps. Media reports claim that these attacks are part of a larger social engineering…

Hacker Leaks Data of More Than 15 Million Trello Users

A hacker who calls themselves “emo” says they accessed the information of 15 million Trello users in January through an unsecured REST API endpoint and six months later leaked the information on an underground forum. The post Hacker Leaks Data…

Unconstrained Delegation in Active Directory

Overview Unconstrained delegation is a feature in Active Directory that allows a computer, service, or user to impersonate any other user and access resources on their behalf across the entire network, completely unrestricted. A typical example of a use case…

Baffle Extends Encryption Reach to AWS Databases

Baffle today extended its ability to secure multitenant applications running on the Amazon Web Services (AWS) cloud to include the relational databases many of them are deployed on. The post Baffle Extends Encryption Reach to AWS Databases appeared first on…

Best Practices for Security Orchestration, Automation, and Response

Security orchestration and automation enable faster detection and response to security incidents. Continuous monitoring is essential for identifying and responding to threats in real-time. Regular training and simulation exercises equip your security team to handle real-world incidents effectively. SOAR stands…

Critical OpenSSH Vulnerability (regreSSHion) Gives Root Access

An unauthenticated remote code execution vulnerability (CVE-2024-6387) was discovered in OpenSSH, a widely used tool for secure remote access. Dubbed “regreSSHion”, this race condition vulnerability allows attackers to take complete control in glibc-based Linux systems. Let’s break down what this…

Why SMB Security Needs Efficient Device Management

SMBs are increasingly becoming the cyberattacker’s goldmine. Device management is one way to stay ahead of malicious actors and protect your crown data jewels. The post Why SMB Security Needs Efficient Device Management appeared first on Security Boulevard. This article…

How Much Does Penetration Testing Cost?

Curious about how much penetration testing costs? You understand its importance, but budgeting for different pentests can be a challenge.  This blog post will guide you through the intricacies of… The post How Much Does Penetration Testing Cost? appeared first…