Category: Security Boulevard

Protecting Against FraudGPT

FraudGPT is every CEO’s worst nightmare because it provides attackers with a ready-made tool to create highly realistic phishing scams. The post Protecting Against FraudGPT appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Why Bad Bots Are the Digital Demons of the Internet

In the dimly lit corners of the internet, where shadows flicker and eerie silences prevail, there lurks entities of malevolent intent. They are not the stuff of old wives’ tales or campfire ghost stories. We’re talking about bad bots, the…

Cisco IOS XE CVE-2023-20198: Deep Dive and POC

Introduction This post is a follow up to https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/. Previously, we explored the patch for CVE-2023-20273 and CVE-2023-20198 affecting Cisco IOS XE and identified some likely vectors an attacker might […] The post Cisco IOS XE CVE-2023-20198: Deep Dive and…

What makes Web Applications Vulnerable?

Virtual programs are now an essential component of our daily lives. Web applications are now essential tools for both individuals and organizations. From online shopping to social media and banking, we depend on internet apps for convenience and accessibility. However,…

Simplify User Access with Federated Identity Management

Discover the power of federated identity management for seamless SSO and enhanced user access. Improve security and streamline authentication The post Simplify User Access with Federated Identity Management appeared first on Security Boulevard. This article has been indexed from Security…

What is a Cloud Workload Protection Platform ? (CWPP)

Diving into the Depths of Cloud Workload Defense Framework (CWDF) Mysteries Setting out to understand cloud security, one frequently encounters the term – Cloud Workload Defense Framework (CWDF). What exact role does CWDF play? Let’s decode this riddle. At its…

Lateral Movement: Abuse the Power of DCOM Excel Application

In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within the distributed component object model (DCOM) Excel application. This technique is built upon Matt Nelson’s initial research on “Lateral Movement using Excel.Application and DCOM”. What…

Accelerating FedRAMP ATOs: OMB Memo

The Office of Management and Budget (OMB) released a Draft Memorandum for Modernizing the Federal Risk and Authorization Management Program (FedRAMP) on Friday, Oct 27, 2023. FedRAMP was codified in 2022 when Congress passed the FedRAMP Authorization Act (“Act”).  The…

How to Get HITRUST Certified—and Why

What is the HITRUST Certification? In 2007, a group of healthcare organizations, technology companies, and government agencies—including the American Hospital Association, Blue Cross Blue Shield Association, the Centers for Medicare & Medicaid Services (CMS), McKesson Corporation, and Microsoft—got together to…

Identity Theft: The Silent Threat for Executives

Identity theft isn’t a new phenomenon, but its rise in the executive world can no longer be ignored. As a CISO, you understand the importance of safeguarding not only your organization’s data but also the personal information of your top-level…

8 Essential Windows Security Tips to Protect Your Computer

Windows operating systems and software are complex pieces of software with millions of lines of code. This means that there are many potential vulnerabilities, or flaws, that can be exploited by attackers. Attackers can use vulnerabilities to gain unauthorized access…

Achieving Zero-Standing Privileges with Okta and Apono

Organizations are twice as likely to get breached through compromised credentials than any other threat vector. Compromised credentials are when credentials, such as usernames and passwords, are exposed to unauthorized entities.  When lost, stolen or exposed, compromised credentials can give…

DEF CON 31 – Policy Panel: International Cyber Policy 101

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

SOC Automation Explained: 7 Real-World Examples

The Security Operations Center (SOC) serves as a hub for an organization’s cybersecurity efforts. It is tasked with the responsibility of defending against unauthorized activities in the digital landscape. A SOC specializes in activities including monitoring, detection, analysis, response, and…

Why Smart SOAR is the Best SOAR for Slack

Effective communication is a critical component in incident response, often making the difference between rapid resolution and prolonged impact. This article explores how the integration between Smart SOAR and Slack provides a focused set of automated tasks to improve communication…

Staying Ahead of Social Engineering Threats

With social engineering exploits on the rise, now is a good time to stay ahead of threats and attackers’ tricks, keep your personal and sensitive data safe and stop unlawful entry into your organization. Bad actors are always looking for…

IT, Security Leaders Play Catch-Up With Generative AI Threats

There’s a significant disparity between organizations’ concerns about generative AI risks and their effectiveness in addressing them. The post IT, Security Leaders Play Catch-Up With Generative AI Threats appeared first on Security Boulevard. This article has been indexed from Security…

The Critical Need to Defend Against Unauthorized Apps

Safeguarding Security and Integrity: In today’s digital landscape, mobile applications have become integral to our daily lives, offering convenience, entertainment, and essential services. However, with the rise of mobile app usage, there’s also been a surge in unauthorized and malicious…

Introduction to WAF Exception Policy

Exception policies are supplements or restrictions to configured basic or advanced protection policies. On the Exception Policy page, you can create, edit, delete, and duplicate exception policies. You can also create and edit exception policies on the Website Protection page.…

Navigating the Complex World of Platform Engineering

One of the most prevalent misconceptions surrounding platform engineering is the notion that the team’s ultimate success results in creating a single tool with … The post Navigating the Complex World of Platform Engineering appeared first on OpsCanvas. The post…

Successful Cyber Risk Quantification: Webinar Takeaways

The following is a webinar takeaways blog that featured David White, Axio President and Yousef Ghazi-Tabatabai, Director PwC UK. Moderation provided by Jennifer Moll, VP of Strategy, Axio Embark on Read More The post Successful Cyber Risk Quantification: Webinar Takeaways…

Guarding Paradise: Strategies for Cybersecurity in Exclusive Enclaves

The allure of paradise often beckons the world’s wealthiest individuals to remote and opulent island communities. However, beneath the surface of this opulence lies a digital battleground where cybercriminals and foreign adversaries target high-net-worth individuals (HNWIs) and high-profile figures. We…

Darktrace Extends AI Reach to Secure AWS Clouds

Darktrace’s cloud security platform leverages AI to detect known trusted deployment patterns and automatically apply missing controls. The post Darktrace Extends AI Reach to Secure AWS Clouds appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Four Steps to Integrate Zero-Trust

So, how do you know who to trust in your company when it comes to protecting your most sensitive data? The answer: No one. The post Four Steps to Integrate Zero-Trust appeared first on Security Boulevard. This article has been…

Ripcord Transforms, Anitian Empowers, Agencies Win

As far back as 2011 a presidential mandate said, “Records are the foundation of open government.” This mandate went on to say that accessible, readable public records supported the “principles of transparency, participation, and collaboration” in society, as well as…

How AI is Transforming Defensive Cybersecurity

In the rapidly evolving world of cybersecurity, adopting artificial intelligence (AI) is proving to be a game changer for defense teams. AI offers a multitude of benefits, revolutionizing defensive operations and providing a competitive edge in the battle against cyberthreats.…

Zscaler Report Surfaces Spike in IoT Cyberattacks

In the first six months of 2023, Zscaler found a 400% increase in blocked malware attacks targeting IoT environments. The post Zscaler Report Surfaces Spike in IoT Cyberattacks appeared first on Security Boulevard. This article has been indexed from Security…

DEF CON 31 – Craig Martell’s ‘Shall We Play A Game’

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

SMBs Increasingly Confident in Cybersecurity

Most SMBs consider themselves well-protected against cybersecurity threats, but less than 60% use password managers, 2FA or make cybersecurity training available. The post SMBs Increasingly Confident in Cybersecurity appeared first on Security Boulevard. This article has been indexed from Security…

Shadow Access Creates Invisible Cloud Security Risks

Shadow access, akin to Shadow IT, is a struggle for organizations to understand, much less to manage and control. The post Shadow Access Creates Invisible Cloud Security Risks appeared first on Security Boulevard. This article has been indexed from Security…

Java Is Still Full of Surprises After 28 Years

State of Java 2023 is an authoritative guide to understanding Java adoption and trends, Oracle’s recent pricing update. The post Java Is Still Full of Surprises After 28 Years appeared first on Azul | Better Java Performance, Superior Java Support.…

The Rise of DevOps in Startups- A Strategic Approach

In the rapidly changing development of technology, businesses are in tight competition to stay ahead. DevOps for startups is the best method to use. The post The Rise of DevOps in Startups- A Strategic Approach first appeared on Devops Bridge.…

How an EOR can keep you GDPR compliant in 2023

As a data privacy framework, GDPR focuses on safeguarding personal information and enforces strict rules for data management. The post How an EOR can keep you GDPR compliant in 2023 appeared first on Scytale. The post How an EOR can…

Five fraud solution oversights that gut business growth

Sustaining secure growth isn’t solely about chasing revenue. It takes building and maintaining a competitive edge by delivering consistent value. It requires that both speed and accuracy be a priority across the customer journey. It also means integrating real user…

Okta Hacked Yet Again: 2FA Firm Failed to 2FA

You had one job: Once is happenstance, twice is coincidence, FIVE TIMES is sheer incompetence. The post Okta Hacked Yet Again: 2FA Firm Failed to 2FA appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Incident Workflow to streamline ITGC testing

Enhanced Incident Workflow streamlines ITGC testingITGCs are required by the Sarbanes Oxley Act of 2002 (SOX) to ensure the integrity of financial reports. While SOX is focused on the propriety of your financial and accounting practices, SOX ITGC controls focus…

Access Policy Review Segregation of Duty Controls

Enhanced Access Policy Review To Ensure Segregation of Duty Controls are Complete and Accurate  As more customers adopt cloud applications, they are facing new challenges as the security privileges within the roles granted to users are automatically updated. For example, Oracle…

Access Governance vs Access Management

Access Governance vs. Access Management:A Comprehensive FocusIn the first blog of our latest blog series, “Top Five Access Governance Google Searches – Answered,” we explore the fundamental concepts of Access Governance, differentiating it from Access Management. We clarify these distinctions…

Behind the Breach: Cross-tenant Impersonation in Okta

In recent investigations, the Obsidian Threat Research team has observed multiple instances of cross-tenant impersonation used to establish persistence and escalate user privileges within Okta environments. This technique poses a significant risk to organizations that rely on Okta for identity…

On Detection: Tactical to Functional

Part 9: Perception vs. Conception The concepts discussed in this post are related to those discussed in the 9th session of the DCP Live podcast. If you find this information interesting, I highly recommend checking the session out! https://medium.com/media/89a600d7731c06c483f9d3c89ddc5ff7/href At this…

Palo Alto Networks Extends Scope of CNAPP Reach

Via a Darwin update, Palo Alto Networks this week added six capabilities to its cloud-native application protection platform (CNAPP). The post Palo Alto Networks Extends Scope of CNAPP Reach appeared first on Security Boulevard. This article has been indexed from…

Daniel Stori’s ‘Cloud Autoscaling Revealed

via the webcomic talent of the inimitable Daniel Stori at Turnoff.US. Permalink The post Danie […] This article has been indexed from Security Boulevard Read the original article: Daniel Stori’s ‘Cloud Autoscaling Revealed

VMware Aria Operations for Logs CVE-2023-34051 Technical Deep Dive and IOCs

Introduction This report is a follow up to https://www.horizon3.ai/vmware-vrealize-log-insight-vmsa-2023-0001-technical-deep-dive/. Earlier this year we reported the technical details for VMSA-2023-0001 affecting VMware Aria Operations for Logs (formerly VMware vRealize Log Insight). […] The post VMware Aria Operations for Logs CVE-2023-34051 Technical…