Automating SSL certificate renewals is essential for businesses of all sizes to avoid outages and security risks associated with expired certificates. The renewal process can be complex and time-consuming, especially for organizations with large or intricate IT infrastructures. With upcoming…
Category: Security Boulevard
Phishing Threat Actor Leverages AI to Target Multiple Crypto Brands
A crypto phishing campaign has been identified in which a threat actor employs AI-generated content to create 17,000 phishing lure sites impersonating more than 30 major cryptocurrency brands, including Coinbase, Crypto.com, Metamask and Trezor. The post Phishing Threat Actor Leverages…
Strengthening Security Posture in the World of Outsourced Ransomware-as-a-Service (RaaS)
These proactive defense measures – vulnerability management, MFA and EDR – remain critical in the ongoing battle against RaaS groups and bad actors. The post Strengthening Security Posture in the World of Outsourced Ransomware-as-a-Service (RaaS) appeared first on Security Boulevard.…
Data Breaches Impact Growing Number of Victims, ITRC Finds
The number of data breach victims in the first half (H1) of 2024 has surged to 1,078,989,742, marking a 490% increase compared to the same period in 2023, which saw 182,645,409 victims. The post Data Breaches Impact Growing Number of…
CapraRAT Spyware Masks As Popular Android Apps
In the realm of cybercrime, a threat actor by the name of Transparent Tribe is rapidly spreading the CapraRAT spyware by disguising it as popular Android apps. Media reports claim that these attacks are part of a larger social engineering…
Hacker Leaks Data of More Than 15 Million Trello Users
A hacker who calls themselves “emo” says they accessed the information of 15 million Trello users in January through an unsecured REST API endpoint and six months later leaked the information on an underground forum. The post Hacker Leaks Data…
Unconstrained Delegation in Active Directory
Overview Unconstrained delegation is a feature in Active Directory that allows a computer, service, or user to impersonate any other user and access resources on their behalf across the entire network, completely unrestricted. A typical example of a use case…
Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own
Steamboat bloat: Hacktivist group wields infostealer Trojan, leaks 1,200 GB of mouse droppings. The post Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign
The APT group Void Banshee exploited a now-patched Windows security flaw and the retired Internet Explorer browser to distributed the Atlantida malware to steal system information and sensitive data from victims. The post Void Banshee Group Used ‘Windows Relic’ IE…
Safeguarding Your Collaboration Tools: Tackling the New Favorite Targets of Attackers
Secrets in collaboration tools are becoming prime targets for attackers. Reduce your attack surface by extending GitGuardian automated secrets detection capabilities to Slack, Jira, Confluence, or Microsoft Teams. Ensure security wherever your teams collaborate! The post Safeguarding Your Collaboration Tools:…
Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud Security Before Going ‘All In’ on Generative AI
Generative AI has great potential for scaling and automating security practices, but to be effective, organizations need to have a strong security foundation. The post Fortifying Digital Infrastructure: Why Companies Must Strengthen Cloud Security Before Going ‘All In’ on Generative…
Baffle Extends Encryption Reach to AWS Databases
Baffle today extended its ability to secure multitenant applications running on the Amazon Web Services (AWS) cloud to include the relational databases many of them are deployed on. The post Baffle Extends Encryption Reach to AWS Databases appeared first on…
Drive-by Download Attacks Become Distribution Medium For FakeBat Malware
Recent findings have revealed that the Loader-as-a-Service (LaaS), known as FakeBat, is now one of the most widespread malware families in the world. The FakeBat malware uses the drive-by download malware technique as a distribution to compromise targets. In this…
Best Practices for Security Orchestration, Automation, and Response
Security orchestration and automation enable faster detection and response to security incidents. Continuous monitoring is essential for identifying and responding to threats in real-time. Regular training and simulation exercises equip your security team to handle real-world incidents effectively. SOAR stands…
Critical OpenSSH Vulnerability (regreSSHion) Gives Root Access
An unauthenticated remote code execution vulnerability (CVE-2024-6387) was discovered in OpenSSH, a widely used tool for secure remote access. Dubbed “regreSSHion”, this race condition vulnerability allows attackers to take complete control in glibc-based Linux systems. Let’s break down what this…
SEG vs. SEG: How Threat Actors are Pitting Email Security Products Against Each Other With Encoded URLs
Email security tools such as Secure Email Gateways (SEGs) often encode URLs that are embedded in emails. This enables the security appliance to scan the URL before the recipient visits the website. Oftentimes when SEGs detect URLs in emails that…
GUEST ESSAY: Consumers, institutions continue to shoulder burden for making mobile banking secure
The rapid adoption of mobile banking has revolutionized how we manage our finances. Related: Deepfakes aimed at mobile banking apps With millions of users worldwide relying on mobile apps for their banking needs, the convenience is undeniable. However, this surge…
Why SMB Security Needs Efficient Device Management
SMBs are increasingly becoming the cyberattacker’s goldmine. Device management is one way to stay ahead of malicious actors and protect your crown data jewels. The post Why SMB Security Needs Efficient Device Management appeared first on Security Boulevard. This article…
How Much Does Penetration Testing Cost?
Curious about how much penetration testing costs? You understand its importance, but budgeting for different pentests can be a challenge. This blog post will guide you through the intricacies of… The post How Much Does Penetration Testing Cost? appeared first…
NSFOCUS Recognized in Forrester’s Enterprise Firewall Landscape Report, Q2 2024
SANTA CLARA, Calif., July 17, 2024 – NSFOCUS, a leading cybersecurity company, is proud to announce its inclusion in the prestigious The Enterprise Firewall Landscape, Q2 2024 report by Forrester, a globally recognized research and advisory firm. NSFOCUS has been…