Category: Security Boulevard

Why SPRS Matters and 4 Steps to Improve Your Security Posture

The supplier performance risk system (SPRS) is a database maintained by the DoD that “utilizes suppliers’ performance data in areas of product delivery and quality to rate performance and predict potential risk.” The post Why SPRS Matters and 4 Steps…

Balancing Security and Convenience with EV Charging

Even as manufacturers tackle convenience issues, the need for digital trust throughout EV infrastructure and ecosystems still remains. The post Balancing Security and Convenience with EV Charging appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Human Vigilance is Required Amid AI-Generated Cybersecurity Threats

While many organizations are adopting AI at an alarming pace to gain efficiencies and lower operating costs through technology and headcount reduction, they may also be sacrificing their security. The post Human Vigilance is Required Amid AI-Generated Cybersecurity Threats appeared…

Continuous Threat Exposure Management for Google Cloud

On July 9th, 2020, an independent security firm discovered a trove of personal health information belonging to Pfizer patients on the public internet. The breach exposed unencrypted conversations between patients and providers of four different Pfizer products, including full names,…

Paperclip Maximizers, Artificial Intelligence and Natural Stupidity

Existential risk from AI Some believe an existential risk accompanies the development or emergence of artificial general intelligence (AGI). Quantifying the probability of this risk is a hard problem, to say nothing of calculating the probabilities of the many non-existential…

Applying Bloch’s Philosophy to Cyber Security

Ernst Bloch, a luminary in the realm of philosophy, introduced a compelling concept known as the “Not-Yet” — a philosophy that envisions the future as a realm of potential and possibility. Bloch’s ideas revolve around the belief that the world…

Researchers Discover Cache of Billion Stolen Passwords

Researchers claim to have uncovered what they claim is the biggest cache of stolen credentials ever found. The post Researchers Discover Cache of Billion Stolen Passwords appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Randall Munroe’s XKCD ‘Routine Maintenance’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2952/” rel=”noopener” target=”_blank”> <img alt=”” height=”413″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/9633d7d7-f49c-4a83-bf12-0235ff3676d0/routine_maintenance.png?format=1000w” width=”299″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Routine Maintenance’ appeared first…

‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought

Spackle attack: Chinese company takes over widely used free web service—almost 400,000 websites at risk. The post ‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

The Pros and Cons of Secure Access Service Edge (SASE)

Software-Defined Wide Area Network (SD-WAN) manages and optimizes the delivery of network services across multiple locations. Secure Web Gateway (SWG) protects users from web-based threats by filtering malicious content, including malware, phishing attempts, and unauthorized websites. Zero Trust Network Access…

Understanding API Key Verification

As organizations look to improve their API security, two distinct approaches to API key verification have emerged — centralized and decentralized verification. The post Understanding API Key Verification appeared first on Security Boulevard. This article has been indexed from Security…

Smashing Silos With a Vulnerability Operations Center (VOC)

VOC enables teams to address the vulnerabilities that present the greatest risk to their specific attack surface before they can be exploited. The post Smashing Silos With a Vulnerability Operations Center (VOC) appeared first on Security Boulevard. This article has…

The Runtime Secrets’ Security Gap

The last mile in secrets security is securing secrets in workloads. Discover a new way to securely deliver encrypted secrets in your infrastructure with innovative open-source tools, and say goodbye to plaintext secrets. The post The Runtime Secrets’ Security Gap…

Compliance, Security and the Role of Identity

While compliance frameworks establish baseline requirements for data protection, they may not always align with the rapidly evolving threat landscape. The post Compliance, Security and the Role of Identity appeared first on Security Boulevard. This article has been indexed from…

Rethinking Cybersecurity in the Age of AI

IT managers and CSOs need to rethink their approach to cybersecurity and protect their organizations from this new breed of AI-powered attacks. The post Rethinking Cybersecurity in the Age of AI appeared first on Security Boulevard. This article has been…

Alert: French Diplomats Targeted By Russian Cyber Attacks

France’s cybersecurity agency has issued a warning about a hacking group linked to Russia‘s Foreign Intelligence Service (SVR), threatening the nation’s diplomatic interests. The French information security agency, ANSSI, revealed in an advisory that state-sponsored actors with ties to Russia…

Ghostscript Vulnerabilities Patched in Recent Ubuntu Updates

Canonical has released Ubuntu security updates to address several Ghostscript vulnerabilities identified by security researchers. These vulnerabilities could potentially allow attackers to bypass security restrictions or even execute malicious code on your system. Ghostscript is a widely used tool for…

United States of America, Independence Day 2024

<a class=” sqs-block-image-link ” href=”https://tile.loc.gov/image-services/iiif/service:gdc:gdcwdl:wd:l_:02:70:5:wdl_02705:00300_2003_001_pr/full/pct:100/0/default.jpg” rel=”noopener” target=”_blank”> <img alt=”” height=”1600″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/9a3b7050-c8a8-448d-8043-c91115294dec/United%2BStates%2Bof%2BAmerica%2BDeclaration%2Bof%2BIndependence.jpeg?format=1000w” width=”1348″ /> </a><figcaption class=”image-caption-wrapper”> via our Library of Congress, United States of America The **United States of America**, Declaration of Independence The post United States of America, Independence Day…

The Metadata Minefield: Protecting All Your Sensitive Data

When determining the sensitivity of data, it’s easy to focus solely on the content itself. However, the metadata associated with… The post The Metadata Minefield: Protecting All Your Sensitive Data appeared first on Symmetry Systems. The post The Metadata Minefield:…

Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the highly sophisticated Russian adversary Sandworm during various destructive activities against targets in Ukraine and other countries in the region shortly before the launch of the Russian…

Securing Supply Chains After Baltimore

In March, a container ship leaving the Helen Delich Bentley Port of Baltimore struck a support piling holding up the Francis Scott Key Bridge, knocking the bridge into the water and killing six workers who were aboard the bridge. With…

Randall Munroe’s XKCD ‘Bad Map Projection: Exterior Kansas’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2951/” rel=”noopener” target=”_blank”> <img alt=”” height=”706″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/33d891f5-75a7-449f-be6e-917292bb9db2/bad_map_projection_exterior_kansas.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & cartographic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Bad Map Projection: Exterior…

CISO Panel: How Security Teams Are Evolving Their Strategies in 2024

The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have adjusted their security strategy this year. These changes are primarily driven by artificial intelligence (AI), regulatory……

RegreSSHion CVE-2024-6387: A Targeted Exploit in the Wild

A critical security flaw, known as regression and cataloged under CVE-2024-6387, has been identified in OpenSSH, just a few days ago. This vulnerability allows an unauthenticated attacker to execute arbitrary code and potentially obtain root access on the compromised system.…

Man-In-The-Middle Attacks are Still a Serious Security Threat

Man-in-the-middle attacks have increased in the age of digital connectivity and remote work, forcing companies to develop strategies to mitigate them. The post Man-In-The-Middle Attacks are Still a Serious Security Threat appeared first on Security Boulevard. This article has been…

How to Achieve Crypto Resilience for a Post-Quantum World

While it’s unlikely that quantum computers are currently in the hands of cybercriminals or hostile nation-states, they will be. The post How to Achieve Crypto Resilience for a Post-Quantum World appeared first on Security Boulevard. This article has been indexed…

The Secret Threat Hiding in Your SaaS Stack: Shadow IT

While SaaS apps enable better business operations, a secret threat is hiding in your SaaS stack: “Shadow IT.” The post The Secret Threat Hiding in Your SaaS Stack: Shadow IT appeared first on Security Boulevard. This article has been indexed…

How do you assess the risk of AI within your operations?

How do you assess the risk of AI within your operations? How do you assess the risk of AI within your operations? Assessing the Risk of AI Within Your Operations Assessing the Risk of AI Within Your Operations Artificial intelligence…

Latest OpenSSH Vulnerability Might Impact 14M Linux Systems

Qualys this week reported the discovery of a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH servers (sshd) that could potentially impact more than 14 million Linux systems. The post Latest OpenSSH Vulnerability Might Impact 14M Linux Systems appeared first on…

Best Parental Control App for Parents in 2024

Safes the top parental monitoring apps provide advanced tools to keep children safe online with real-time alerts and customizable settings. The post Best Parental Control App for Parents in 2024  appeared first on SternX Technology. The post Best Parental Control…

Building Resilience in the Chip Supply Chain

To bolster digital security and resilience across the semiconductor supply chain, a critical first step is that organizations across the supply chain must re-orient their cybersecurity strategies. The post Building Resilience in the Chip Supply Chain appeared first on Security…

Is Your Cloud Security a Mess? Five Problems CNAPP Can Cure

Companies that implement a holistic Cloud Native Application Protection Platform (CNAPP) position themselves for game-changing advantages. The post Is Your Cloud Security a Mess? Five Problems CNAPP Can Cure appeared first on Security Boulevard. This article has been indexed from…

7 Steps To Secure Critical Infrastructure

Critical infrastructure and public sector organizations such as government and municipalities, manufacturing units, communication networks, transportation services, power and water treatment plants, et. al, have been battling a growing wave of breaches and cyberattacks. The post 7 Steps To Secure…

SEC Disclosure Inconsistencies Amid Snowflake Breach | Kovrr

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post SEC Disclosure Inconsistencies Amid Snowflake Breach | Kovrr appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: SEC…

An Identity Love Story: Hardware vs Software Security Tokens

Identity Security Cybersecurity has been growing since the first computer was created. And it is… The post An Identity Love Story: Hardware vs Software Security Tokens appeared first on Axiad. The post An Identity Love Story: Hardware vs Software Security…

Infostealers on the Rise: A New Wave of Major Data Breaches?

This blog continues our previous article, The Resurgence of Major Data Breaches, where we discussed the alarming increase infostealers in data breaches orchestrated by the notorious ShinyHunters group. In this part, we delve into the role of infostealers in these…

What is the Role of Explainable AI (XAI) In Security?

While AI helps automatically detect and respond to rapidly evolving threats, XAI helps security professionals understand how these decisions are being made. The post What is the Role of Explainable AI (XAI) In Security? appeared first on Security Boulevard. This…

Remote Rigor: Safeguarding Data in the Age of Digital Nomads

Digital nomads go where the wind takes them around the globe, often working from coffee shops, co-working locations or public libraries. They rely on connecting to their work life via their mobile hotspot or public wi-fi connections. The post Remote…

USENIX Security ’23 – Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators

Authors/Presenters:Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from…

Montgomery County, Md.’s Chatbot Shows GenAI in Action

I’m always looking for best practices and examples to share around government AI and cyber projects. Monty 2.0 is certainly praiseworthy and a GenAI project to watch and learn from. The post Montgomery County, Md.’s Chatbot Shows GenAI in Action…

Staying Ahead of Adversarial AI with Incident Response Automation

< div class=”cf be fw fx fy fz”> Staying Ahead of Adversarial AI with Incident Response Automation 5 min read·Just now — A Security Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer. The security operations (SecOps) community constantly…

Generative AI vs. Predictive AI: A Cybersecurity Perspective

AI promises considerable benefits however there’s still a lot of confusion surrounding the topic, particularly around the terms generative AI and predictive AI. The post Generative AI vs. Predictive AI: A Cybersecurity Perspective appeared first on Security Boulevard. This article…

Unfurling Hemlock Tossing ‘Cluster Bombs’ of Malware

A threat group dubbed Unfurling Hemlock infects targeted campaign with a single compressed file that, once executed, launches a ‘cluster bomb’ of as many as 10 pieces of malware that include loaders, stealers, and backdoors. The post Unfurling Hemlock Tossing…

Temu is Malware — It Sells Your Info, Accuses Ark. AG

Chinese fast-fashion-cum-junk retailer “is a data-theft business.” The post Temu is Malware — It Sells Your Info, Accuses Ark. AG appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Temu is Malware…

The Eureka Moment: Discovering Application Traffic Observability

If you’ve been part of a network segmentation or Zero Trust architecture planning project or a data center or application migration initiative, the following scenario probably rings true. The post The Eureka Moment: Discovering Application Traffic Observability appeared first on…

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Explore insights from CloudNativeSecurityCon 2024, including securing machine identities, digesting SLSA and GUAC, and the impact of quality documentation. The post Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024 appeared first on Security Boulevard. This article has been indexed from Security…

How to Enhance Security Without Affecting the Customer Experience

Navigating the landscape of customer interactions is a delicate balancing act that requires constant calibration between security and operability (or usability, if speaking from a customer’s perspective). The post How to Enhance Security Without Affecting the Customer Experience appeared first…

Cyberattack Rate Surges as Novel Malware Growth Accelerates

The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intelligence Report. The post Cyberattack Rate Surges as Novel Malware Growth Accelerates appeared first on Security Boulevard. This article has…

Webinar: How to secure Microsoft Copilot & Gen AI

How to secure Microsoft Copilot & Gen AI July 10, 1:00 pm Eastern Time As organizations rapidly adopt Microsoft Copilot… The post Webinar: How to secure Microsoft Copilot & Gen AI appeared first on Symmetry Systems. The post Webinar: How…

Container Security Scanning: Vulnerabilities, Risks and Tooling

Container security is crucial in the age of microservices and DevOps. Learn about common container vulnerabilities, container security scanning, and popular tools to secure your containers in this comprehensive guide. The post Container Security Scanning: Vulnerabilities, Risks and Tooling appeared…

Third-Party Trust Issues: AppSec Learns from Polyfill

By now, you’ve likely seen the LinkedIn posts, the media stories, and even some formerly-known-as “Tweets”: The latest exploit to hit front pages is the malicious use of polyfill.io, a popular library used to power a large number of web…

VMware vCenter RCE Vulnerability: What You Need to Know

VMware, the virtualization technology giant owned by Broadcom, has recently released a security advisory addressing several critical vulnerabilities discovered in its vCenter Server application. Read on to learn more.  Tell me more about VMware vCenter RCE vulnerability  If left unpatched,…

The Evolving SSL/TLS Certificate Lifecycle & How to Manage the Changes

Certificates are dynamic security solutions within PKI, crucial for verifying identities and encrypting communications. Understanding their lifecycle is vital to prevent mismanagement. Learn about lifecycle stages, the impact of reduced validity periods, and the benefits of automated management. The post…

Software composition analysis (SCA): A beginner’s guide

In modern software development, applications are rarely built from scratch. Development teams extensively rely upon open source software components to accelerate development and foster innovation in software supply chains. The post Software composition analysis (SCA): A beginner’s guide appeared first…

Cloud Security Tops Priority List for Organizations Globally

Cloud security has become a major focus for organizations worldwide as they battle with a growing number of data breaches and application sprawl that makes defense more complicated. The post Cloud Security Tops Priority List for Organizations Globally appeared first…

Security Budgets Grow, but Inefficiencies Persist

Most organizations are uncertain about the effectiveness of their cybersecurity investments, despite increasing budgets and rampant cyber incidents, according to Optiv’s 2024 Threat and Risk Management Report. The post Security Budgets Grow, but Inefficiencies Persist appeared first on Security Boulevard.…

Strong Authentication: What It Is and Why You Need It

An amazing post The post Strong Authentication: What It Is and Why You Need It appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Strong Authentication: What It Is and Why You…

How NinjaOne’s New MDM Capabilities Transform IT Management

IT security teams are tasked with protecting an increasingly mobile work environment—managing a myriad of devices efficiently and securely. Addressing this need, NinjaOne has launched its new Mobile Device Management (MDM) capabilities, marking a significant milestone in their mission to…

Chinese APT Groups Use Ransomware to Hide Spying Activities

A Chinese cyberespionage group and two more possibly from China and North Korea are using ransomware in their attacks to either add financial gains to their efforts or to cover their tracks by convincing victims and cybersecurity experts that the…

WordPress Plugin Supply Chain Attack Gets Worse

30,000 websites at risk: Check yours ASAP! (800 Million Ostriches Can’t Be Wrong.) The post WordPress Plugin Supply Chain Attack Gets Worse appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: WordPress…

Misconfigured MFA Increasingly Targeted by Cybercriminals

In the first quarter of 2024, nearly half of all security incidents our team responded to involved multi-factor authentication (MFA) issues, according to the latest Cisco Talos report. The post Misconfigured MFA Increasingly Targeted by Cybercriminals appeared first on Security…

Prioritizing Exposures vs. Prioritizing Actions

Organizations face an overwhelming number of vulnerabilities and threats. The traditional approach has been to prioritize exposures—identifying and addressing the most critical vulnerabilities first. However, this method, while logical on the surface, has significant limitations. At Veriti, we advocate for…

6 Tips for Preventing DDoS Attacks Using Rate Limits

Rate limiting is a well-known technique for limiting network traffic to web servers, APIs, or other online services. It is also one of the methods available to you for blocking DDoS attackers from flooding your system with requests and exhausting…