Category: Security Boulevard

The Top 24 Security Predictions for 2024 (Part 1)

Where next for cyber in 2024? Here’s your annual roundup of cybersecurity forecasts, top cyber trends and cybersecurity industry prediction reports as we head into calendar year 2024. The post The Top 24 Security Predictions for 2024 (Part 1) appeared…

NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks

A new multiplatform threat that uses the peer-to-peer (P2P) NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service (DDoS) attacks to a remote access trojan (RAT). The multiple-threat malware, dubbed NKAbuse, appears…

Romance Scammers are Adopting Approval Phishing Tactics

Romance scams are labor-intensive and time-consuming schemes to run. They can be lucrative, pulling in millions in stolen cryptocurrency, but they also can end up going nowhere if the targeted victim becomes suspicious or the bad actor decides there won’t…

Unlocking Security Excellence: The Power of SOC-as-a-Service

The concept of SOC-as-a-service SOCaaS has multiple benefits and empowers organizations to achieve security excellence. The post Unlocking Security Excellence: The Power of SOC-as-a-Service appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Master Identity Governance

Mastering Identity Governance: A Ballet of Security and ComplianceBy 2025, Gartner predicts that over 40% of organizations will utilize Identity Governance analytics and insights to mitigate security risks. This statistic also addresses one of the most significant challenges for enterprises:…

7 Best Practices for Identity Governance

7 Best Practices for Identity Governance: Securing Your Digital EnterpriseCISOs face heightened pressure to protect business-critical assets across an expanding attack surface. At the same time, IT departments grapple with the challenges posed by a surge in new service models,…

AutoSecT : Powered by Kratikal

Businesses are facing unprecedented challenges in the quick-paced field of cybersecurity. This leads to doubt as to how companies can implement correct measures to protect their digital assets. As the complexity of cyber threats continues to escalate and organizations become…

Randall Munroe’s XKCD ‘DateTime’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2867/”> <img alt=”” height=”478″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/be43a4da-969d-4d0f-a668-f344f778c681/datetime.png?format=1000w” width=”679″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘DateTime’ appeared first on Security Boulevard. This article…

Below the Surface Winter 2023

East vs. West – The Chip Wars are in Full Effect Welcome to the Winter 2023 edition of the Below the Surface Threat Report. Every nation state has long realized that whichever nations win the race to quantum computing and…

Microsoft Targets Threat Group Behind Fake Accounts

Microsoft seized parts of the infrastructure of a prolific Vietnam-based threat group that the IT giant said was responsible for creating as many as 750 million fraudulent Microsoft accounts that were then sold to other bad actors and used to…

The U.S. Needs a Better AI Plan

To supercharge its technological capabilities, the US government is setting sail on a transformative AI journey. However, a recent Government Accountability Office (GAO) report reveals a critical lack of policies and standards, leaving the nation’s security vulnerable. The 96-page exposé…

US Sanctions Sinbad Mixer: Disrupting Threats Unveiled

The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It’s a virtual currency mixer utilized by the North Korea-linked Lazarus Group to launder funds obtained through various heists. This…

NIST CSF Adoption and Automation

As a gold standard for cybersecurity in the United States and the foundation for many new standards and regulations starting to emerge today, the National Institute of Standards and Technology’s (NIST CSF) Cybersecurity Framework is more crucial than ever. Developed…

At a Glance: The Year in Cybersecurity 2023

In this post, we’ll take a look at some of the trends and news from 2023, and see what insights they could hold for the years ahead. The post At a Glance: The Year in Cybersecurity 2023 appeared first on…

Daniel Stori’s ‘Docker Panacea’

<a class=” sqs-block-image-link ” href=”https://turnoff.us/geek/docker-panacea/”> <img alt=”” height=”1009″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e5bc88dc-adbe-4618-8ad8-66425e0d54a2/panacea.png?format=1000w” width=”850″ /> </a><figcaption class=”image-caption-wrapper”> via the webcomic talent of the inimitable Daniel Stori at Turnoff.US. Permalink The post Daniel Stori’s ‘Docker Panacea’ appeared first on Security Boulevard. This article has been…

Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658

When will it end? Russia takes down Kyivstar cellular system, Ukraine destroys Russian tax system. The post Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Clang Sanitizers: Keeping Your Code Clean and Secure

Clang sanitizers are a powerful toolset for developers to improve the quality and security of their C and C++ code. Developed as part of the LLVM compiler infrastructure, they offer a variety of benefits, including: 1. Memory Error Detection: 2.…

FCC Warns Carriers to Protect Customers Against SIM Swaps

A month after issuing new rules to push back against SIM-swap and similar schemes, the Federal Communications Commission (FCC) is warning mobile phone service providers of their obligations to protect consumers against the growing threat. The FCC’s Enforcement Bureau will…

Attack Surface Management: What is it? Why do you need it?

Traditional asset inventory and vulnerability management software can’t keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates… The post Attack Surface Management: What is it? Why do…

Top CISOs to Follow in 2024: Germany Edition

Here are just some of the top CISOs in Germany going into 2024 and some of their insights and experiences we can learn from. The post Top CISOs to Follow in 2024: Germany Edition appeared first on Scytale. The post…

Python 2 EOL: Coping with Legacy System Challenges

Python 2 was officially maintained and supported until January 1, 2020.   The system becomes highly vulnerable without Python 2 security updates.   TuxCare’s ELS for Python provides security fixes for Python 2.7 versions.   Python 2.7 was the last…

How CSRD and EED are Reshaping Data Center Sustainability Reporting

With greater scrutiny of environmental impacts and a burgeoning consciousness about the social responsibility of data center operators, European regulations are undergoing significant transformations. The advent of the Corporate Sustainability Reporting Directive (CSRD) and the Energy Efficiency Directive (EED) are…

Snyk Launches ASPM Platform to Secure Software Supply Chains

Snyk’s ASPM platform promises to bridge the divide between cybersecurity teams and application developers. The post Snyk Launches ASPM Platform to Secure Software Supply Chains appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

CISA Unveils Tools to Strengthen Google Cloud Services

As organizations continue their migration to the cloud, threat groups are not far behind. According to a report earlier this year from cybersecurity firm CrowdStrike, the number of attacks against cloud environments in 2022 jumped 95% year-over-year, and those involved…

Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues

A new hope: Beeper’s reverse engineered iMessage integration, once killed by Tim’s crew, rises phœnix like. The post Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Why Biden’s EO on AI Conflates the Role of Red-Teaming

The AI executive order’s broad language, particularly the role of red-teaming, prompts doubts about its practical implementation and effectiveness. The post Why Biden’s EO on AI Conflates the Role of Red-Teaming appeared first on Security Boulevard. This article has been…

Reco Employs Graph and AI Technologies to Secure SaaS Apps

Reco launched a platform that uses machine learning algorithms and graph technology to secure software-as-a-service (SaaS) applications. The post Reco Employs Graph and AI Technologies to Secure SaaS Apps appeared first on Security Boulevard. This article has been indexed from…

MFA and supply chain security: It’s no magic bullet

With attackers increasingly targeting developer accounts and using them to poison software builds, manipulate code, and access secrets and data, development teams are under pressure to lock down their development environments. The post MFA and supply chain security: It’s no…

The Top 10, Top 10 Predictions for 2024

Don’t settle for just ten top cybersecurity predictions, when you can take a quick stroll through ten of the top lists. Catch Peter Silva’s annual post, here on the Ericom blog. The post The Top 10, Top 10 Predictions for…

Understanding SBOMs

In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what’s built. Its popularity among companies globally stems from cost savings and accelerated product time-to-market. However, there is a crucial aspect to…

LogoFAIL Attack: A Deep Dive into UEFI Vulnerabilities

A new threat has emerged, sending shockwaves through the cybersecurity industry – the LogoFAIL attack. This vulnerability targets the image-parsing components within the UEFI code, affecting a multitude of devices and posing a serious risk to the booting process. LogoFAIL…

KubeCon 2023: Not Your Father’s Tenable

This is not your father’s Tenable! Alan Shimel talks with John Tonello from Tenable about the company’s past, present and future. The post KubeCon 2023: Not Your Father’s Tenable appeared first on Security Boulevard. This article has been indexed from…

The top cyber security news stories of 2023

The post The top cyber security news stories of 2023 appeared first on Click Armor. The post The top cyber security news stories of 2023 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Debunking Popular Myths About Vulnerability Management

The post Debunking Popular Myths About Vulnerability Management appeared first on Digital Defense. The post Debunking Popular Myths About Vulnerability Management appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Debunking Popular…

FBI Details How Companies Can Delay SEC Cyber Disclosures

The FBI is outlining how its agents will handle requests from publicly traded companies that want to delay having to disclose a cybersecurity incident under the new controversial Securities and Exchange Commission (SEC) rules that take effect next week. The…

Why Cybersecurity Needs To Be an SMB Priority

SMBs are low-hanging fruit for cybercriminals because they have limited IT resources, staff and cybersecurity defenses. The post Why Cybersecurity Needs To Be an SMB Priority appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Elevate Your Security: Meet Modern Attacks With Advanced CSPM

Modern security teams need the capabilities of real-time CSPM to work across multiple clouds and environments to prevent employee burnout and maximize strong security posture. The post Elevate Your Security: Meet Modern Attacks With Advanced CSPM appeared first on Security…

Report Sees Chinese Threat Actors Embracing Sandman APT

SentinelLabs, Microsoft and PwC issued an alert that threat actors thought to be associated with cybercriminals based in China adopted an APT known as Sandman to insert malware in IT environments. The post Report Sees Chinese Threat Actors Embracing Sandman…

WTH is Modern SOC, Part 1

In recent weeks, coincidentally, I’ve had several conversations that reminded me about the confusion related to “modern SOC.” Some of them were public (example and example), while others private. One particular person went on a quest through several “leading” companies’…

The Endless Pursuit of the Ecosystem

It isn’t possible to fully understand the cybersecurity ecosystem, but it’s the only motivation you need to keep trying. The post The Endless Pursuit of the Ecosystem appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Fighting the Next Generation of Fraud

The introduction of generative AI has been a game changer for fraudsters, transforming ordinary schemes into highly sophisticated efforts. The post Fighting the Next Generation of Fraud appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Identity Fraud Rises as E-Commerce, Payment Firms Targeted

Fraud incidents are on the rise, largely attributed to the surge in impersonation fraud and the accessibility of sophisticated attack methods and tools. The post Identity Fraud Rises as E-Commerce, Payment Firms Targeted appeared first on Security Boulevard. This article…

Welltok Data Breach: 8.5M US Patients’ Information Exposed

In a recent cybersecurity incident, Welltok, a leading healthcare Software as a Service (SaaS) provider, reported unauthorized access to its MOVEit Transfer server, affecting the personal information of approximately 8.5 million patients in the United States. Discovered on July 26,…

How Data Ingestion Works in SOAR

SOAR tools work as consolidation platforms for security alerts and incident response. Endpoint security tools, network security tools, email systems, and other tools collect logs, run detection rules and generate alerts. SOAR then ingests those alerts so teams can work…

CISA to Developers: Adopt Memory Safe Programming Languages

Software makers need to embrace the growing number of newer programming languages that protect memory to reduce the number of security vulnerabilities in their products, according to cybersecurity agencies in the United States and other countries. The U.S. Cybersecurity and…

Lessons Learned: Five Cybersecurity Takeaways from 2023

After another (nearly) action-packed 12 months it’s time to take stock. There have been breaches galore, new cybersecurity mandates and regulations, fascinating data points and the emergence of some industry trends which will shape the future of IT. Here’s our…

Dragos Offers Free OT Security Tools to Small Utilities

Cybersecurity vendor Dragos will provide free operational technology (OT) security software to small water, electric, and natural gas providers, an offer that comes as critical infrastructure comes under increasing attack. The program initially will be available in the United States…

Developers behaving badly: Why holistic AppSec is key

A recent survey shows that untested software releases, rampant pushing of unvetted and uncontrolled AI-derived code, and bad developer security are all culminating to seriously expand security risks across software development. Add in the explosion of low-code/no-code development and economic…

In Pursuit of a Passwordless Future

The passwordless future feels close because we have the technology to do it, but progress will be slow as applications are migrated to adopt passwordless authentication. The post In Pursuit of a Passwordless Future appeared first on Security Boulevard. This…