Category: Security Boulevard

CVE-2023-38545 Curl Vulnerability Details Finally Released

On October 5, 2023, we released a blog post discussing the Curl Vulnerability, the critical security issue in Curl and libcurl version 8.4.0, known as CVE-2023-38545. In addition, there was another low-severity vulnerability, CVE-2023-38546. These vulnerabilities were scheduled to be…

High-Stakes Identity Impersonation: Lessons From the MGM Attack

MGM Resorts recently found itself in the midst of a major cybersecurity incident that not only crippled its operations but also exposed sensitive customer data. The sophisticated attack orchestrated by a group known as Scattered Spider employed social engineering to…

GNOME Libcue Flaw is a Risk to Linux Systems

Security researchers say a flaw in a relatively obscure component of the popular GNOME desktop environment for Linux could allow bad actors to gain control of the system if exploited. The remote code execution (RCE) vulnerability is in libcue, a…

Box Allies With CrowdStrike to Better Secure Files

A Box, Inc. and CrowdStrike alliance will make tools available to secure files and data shared via Box’s cloud service. The post Box Allies With CrowdStrike to Better Secure Files appeared first on Security Boulevard. This article has been indexed…

Cybersecurity and Open Source Experts Up In Arms About the CRA

Provisions in the EU’s proposed Cyber Resilience Act drew more fire from high-profile cybersecurity and open source technology advocates. The post Cybersecurity and Open Source Experts Up In Arms About the CRA appeared first on Security Boulevard. This article has…

Survey Sees Cyberattacks Impacting Primary Health Care Services

A Proofpoint survey found the majority of health care organizations experienced an average of 40 attacks in the past 12 months. The post Survey Sees Cyberattacks Impacting Primary Health Care Services appeared first on Security Boulevard. This article has been…

A Growing Cyberwar in the Widening Israeli-Hamas Conflict

The unprecedented assault by Hamas on Israel over the weekend brought with it cyberattacks by a number of known threat groups, echoing what was seen in the runup and aftermath of Russia’s invasion of Ukraine early last year. It’s a…

Survey Sees Many Cybersecurity Professionals Willing to Jump Ship

Half of cybersecurity professionals reported it is very likely, likely or somewhat likely they will leave their current job this year. The post Survey Sees Many Cybersecurity Professionals Willing to Jump Ship appeared first on Security Boulevard. This article has…

Huge DNA PII Leak: 23andMe Must Share the Blame

DNA: Do Not Agree. 23andMe says it’s not a breach—just credential stuffing. I’m not so sure. The post Huge DNA PII Leak: 23andMe Must Share the Blame appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

How Process Automation Can Help Streamline Security

Process automation is one of the most effective strategies businesses can use to enforce a security-centric culture. The post How Process Automation Can Help Streamline Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

AI More Helpful Than Harmful in Cybersecurity

The majority of of IT security managers see the use of AI in security tools as helpful rather than a threat they must defend against. The post AI More Helpful Than Harmful in Cybersecurity appeared first on Security Boulevard. This…

Insider Risk Digest: Week 39-40

This Article Insider Risk Digest: Week 39-40 was first published on Signpost Six. | https://www.signpostsix.com/ Insider Highlights: Every two weeks, we bring you a round-up of the cases and stories that caught our attention in the realm of insider risk.…

Improve productivity by slowing down your email

Manage teams better by delaying your email! Improve productivity by slowing down your email. Email programs increasingly include the ability to schedule your emails. You can choose when they are sent – in the future, not the past. (They’re not……

Granular Permission Control: Do Organizations Need it?

The modern workplace is constantly evolving, with organizations of all sizes needing to keep up with the ever-changing landscape. One essential part of ensuring a secure working environment is having the right permission control in place.  Fine-grained permission control is…

SaaS Security in Healthcare: What You Need to Know

The migration to SaaS has resulted in the distribution of valuable data across a number of highly decentralized cloud applications. While the security impact of this shift can be felt across all sectors, it weighs particularly heavily on healthcare—an industry…

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. Additionally, the…

ProtectAI Adds Three Tools to Secure AI Models

Protect AI this week has added three open source tools to detect threats to artificial intelligence (AI) models. The post ProtectAI Adds Three Tools to Secure AI Models appeared first on Security Boulevard. This article has been indexed from Security…

Google, Yahoo to Put Tighter Spam Restrictions on Bulk Senders

Email giants Google and Yahoo are putting tighter requirements on bulk email senders in hopes of reducing the massive amounts of spam that hammer inboxes every day and deflecting the phishing and other cyberthreats that hide within it. Google’s AI-enabled…

Everything You Need to Know About 5G Security

It’s no secret that the arrival of 5G technology will usher in a new wave… The post Everything You Need to Know About 5G Security appeared first on Entrust Blog. The post Everything You Need to Know About 5G Security…

iPhone/iPad Warning: Update Now to Avoid Zero-Day Pain

Apple’s embarrassing regression: iOS 17.0.3 fixes yet more nasty zero-days (and the overheating bug). The post iPhone/iPad Warning: Update Now to Avoid Zero-Day Pain appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Generative AI: Cybersecurity’s Ally or Adversary?

While generative AI offers significant benefits, security professionals must remain vigilant to effectively use the tech for cybersecurity. The post Generative AI: Cybersecurity’s Ally or Adversary? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

AI Poses Challenges, Opportunities for IT Security Leaders

Organizations are keen to deploy AI for new revenue growth and productivity initiatives, but threat actors are also ramping up on generative AI-powered attacks. The post AI Poses Challenges, Opportunities for IT Security Leaders appeared first on Security Boulevard. This…

Automated and Manual Backup Procedures for ADS, ADSM and NTA

Configuration backup is important in many scenarios: Next, we will provide a step-by-step guide on performing configuration backup individually for ADS, ADSM, and NTA. ADS ADS supports one-click export of the current configuration. Click Export on ADS System > Local…

Unseen Costs of Ignoring Cyber Security for Small Business

Cyber attacks pose a significant threat to all businesses, with small businesses being especially valuable. Financially unprepared small firms may suffer significant losses and harm to their reputation, pricing strategy, productivity, staff morale, and other factors in the case of…

Unlocking MDM for Small Business: What you need to know

Introduction Navigating the maze of device management is a common challenge for small businesses. With a diverse range of devices—smartphones, tablets, laptops—each with its own set of applications and security settings, the task becomes increasingly complex. This is where Mobile…

CISA and NSA Offer MFA and SSO Guidelines for Developers, Vendors

Developers and tech vendors need to improve multifactor authentication (MFA) and single sign-on (SSO) tools and make them easier for organizations to use to reduce the threat of phishing, password spraying, and similar cyberattacks, according to the nation’s largest cybersecurity…

Welcome Wes Wright: Another Great Day at Ordr

Ordr welcomes Wes Wright as our new Chief Healthcare Officer with immense pleasure and pride. Wes’s distinguished military background, extensive expertise in healthcare, and unwavering commitment to patient safety make him an invaluable addition to our organization. Wes’s appointment reflects…

How Healthcare Threats Are Going Low

When it comes to IT and cybersecurity, few industries can compare to Healthcare. A diverse fleet of high-value devices, supporting mission-critical systems, and carrying highly sensitive and regulated data are all just table stakes for most healthcare security teams.  And…

Qakbot Hackers Delivering Ransomware Despite FBI Takedown

The raid two months ago that shut down the infrastructure of the notorious Qakbot malware group doesn’t seem to have been the kill shot that the FBI and other law enforcement agencies had hoped. The gang’s operators have been running…

NIST CSF vs. ISO 27001: Understanding the Key Differences

Let’s delve into the world of NIST CSF and ISO 27001, and discover which one aligns best with your organization’s unique cybersecurity needs. The post NIST CSF vs. ISO 27001: Understanding the Key Differences appeared first on Scytale. The post…

Biometric Authentication for Digital Identity Protection

Identity-based authentication that uses biometrics is a more reliable solution to identity and access management. The post Biometric Authentication for Digital Identity Protection appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…

Insider Identity Risk to Cloud Security

Identity plays a major role in cloud security and can open the door for serious cybersecurity problems from the inside. The post Insider Identity Risk to Cloud Security appeared first on Security Boulevard. This article has been indexed from Security…

IBM Unfurls AI-Powered Managed Threat Detection and Response

IBM today added managed threat detection and response services that leverage artificial intelligence (AI) to identify and thwart cyberattacks. The post IBM Unfurls AI-Powered Managed Threat Detection and Response appeared first on Security Boulevard. This article has been indexed from…

10 Bot Detection Tools for 2023: Features & Mitigation Methods

< div class=” “> < div class=”mx-5 lg:mx-0 py-12 “> < div class=”max-w-4xl mx-auto custom-prose prose prose-xl lg:px-0″> The surge of malicious bots poses a significant online security risk for your business. Bots can scrape your website content, spam comments,…

Security Spotlight: Monitoring Virtual Network Computing

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about monitoring Virtual Network……

Preventing fraud in the iGaming industry

Discover why fraud prevention is vital for iGaming success, and how to protect your business and players. The post Preventing fraud in the iGaming industry appeared first on Sift Blog. The post Preventing fraud in the iGaming industry appeared first…

Play the Password Game!

A clever person has hosted a Password Game. Give it a try! The post Play the Password Game! appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Play the Password Game!

Gartner® Hype Cycle™ for Endpoint Security, 2023

Security Operations leaders must balance increased visibility, better prioritization of risks, and a focus on business outcomes. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared first on SafeBreach. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared…

Automated Incident Response with Rapid7 and Smart SOAR

Integration between platforms has become a necessity rather than a nice-to-have. Smart SOAR offers a single platform to act as the connective tissue between siloed point solutions that do not natively integrate with each other. Specifically, the collaboration between Smart…

Gartner® Hype Cycle™ for Endpoint Security, 2023

Security Operations leaders must balance increased visibility, better prioritization of risks, and a focus on business outcomes. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared first on SafeBreach. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared…

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #261 – Midwives

<a class=” sqs-block-image-link ” href=”https://www.comicagile.net/comic/midwives/”> <img alt=”” height=”586″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0fd49fd0-a69f-4fe7-97bf-77b23caae369/%23261+-+Midwives.png?format=1000w” width=”662″ /> </a><figcaption class=”image-caption-wrapper”> via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé!…

Two Campaigns Drop Malicious Packages into NPM

The popular NPM code registry continues to be a target of bad actors looking to sneak their malicious packages into open-source code used by software developers. Researchers with Fortinet’s FortiGuard Labs this week said they found almost three dozen malicious…

The Crucial Difference Between Pre- and Post-Delivery Email Scanning

Some major cybersecurity vendors are demonstrating significant flaws because their solutions don’t filter emails until after they reach the Exchange server. The post The Crucial Difference Between Pre- and Post-Delivery Email Scanning appeared first on Security Boulevard. This article has…

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks

Nutanix extended an ability to detect threats that can be addressed by kicking off a recovery process that takes less than 20 minutes to execute. The post Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks appeared first on Security Boulevard.…

23 NYCRR 500 Shadow IT SaaS Provisions

Understand what 23 NYCRR 500 requires for shadow IT SaaS governance, data protection, and overall security operational integrity. The post 23 NYCRR 500 Shadow IT SaaS Provisions appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Certificate Authorities: What They Are & Why They’re Important

CAs are trusted organizations that store, sign and issue SSL certificates for websites. Learn more about how Certificate Authorities work with Sectigo. Certificate authorities play a central role in modern web security, and yet, many people are entirely unaware that…

The MGM attack: What can be learned for your business

The post The MGM attack: What can be learned for your business appeared first on Click Armor. The post The MGM attack: What can be learned for your business appeared first on Security Boulevard. This article has been indexed from…

AWS’ MadPot Honeypot Operation Corrals Threat Actors

Engineers with Amazon Web Services more than a decade ago began developing tools to better collect intelligence on the cyberthreats coming into the giant cloud provider’s IT environment Fast forward to now, and AWS’s sophisticated suite of tools – called…

Broken ARM: Mali Malware Pwns Phones

Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver. The post Broken ARM: Mali Malware Pwns Phones appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Broken ARM:…

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

An Akamai report showed cyberattacks against APIs used in the financial services sector have increased 65% year-over-year. The post Akamai Sees Surge of Cyberattacks Aimed at Financial Services appeared first on Security Boulevard. This article has been indexed from Security…

How to Comply with the SEC’s Cyber Reporting Requirements

As of July 2023, the U.S. Securities and Exchange Commission (SEC) has moved to adopt a new cybersecurity rule on risk management, strategy, governance, and incident disclosure by public companies. The new rule requires SEC registrants to disclose material cybersecurity…

Using ML to Accelerate Incident Management

If adopted correctly, AI and ML could advance incident response efforts by spotting errors and vulnerabilities, communicating issues and improving defensive postures. The post Using ML to Accelerate Incident Management appeared first on Security Boulevard. This article has been indexed…

Survey Results: The Proof is in the Passwords

Passwordless Authentication Continues to Fail to Gain Traction Authentication is a cornerstone of cybersecurity, but strategies to reduce the common pitfalls and resulting security risks haven’t evolved. In 2023, the stakes are higher than ever in the digital world, and…

Elliptic Curve Cryptography Explained

Public key infrastructure (PKI) relies on two different cryptographic keys, a public key and a private key, to encrypt and decrypt data. These complex algorithms use mathematical formulas to generate digital certificates with unique digital identities to secure information. Elliptic…

Zero Trust Architecture: Beyond the Buzzword

Everyone’s heard of zero trust architecture, but why has it become best practice for enterprises around the globe? There’s no shortage of cybersecurity buzzwords. Among them, “zero trust” stands out not just as a trendy term, but as a transformative…

9 Secrets Management Strategies that every company should adopt

While you might know your secrets vaults to store your organization’s most sensitive assets — API keys, access tokens, and certificates — a solid secrets management strategy ensures these vaults themselves are safe and secure. The post 9 Secrets Management…

Choosing the Unified SASE Provider: The Execution Isolation Factor

Shared Processes for Packet-level Security Technologies Networking and security technologies at the packet level, such as stateful inspection firewalls, IPSEC, and load balancing, impose lower computational demands in terms of the number of CPU cycles required for each packet. Furthermore,…

How to Stop Phishing Attacks with Protective DNS

Phishing Threats Are Increasing in Scale and Sophistication Phishing remains one of the most dangerous and widespread cybersecurity threats. This blog examines the escalating phishing landscape, shortcomings of common anti-phishing approaches, and why implementing a Protective DNS service as part…

Threat Groups Accelerating the Use of Dual Ransomware Attacks

Ransomware groups are shrinking the time between attacks on the same victim, sometimes targeting the same company twice within 48 hours using different malware variants, according to the FBI. In a notice late last month, the agency noted that since…

How to Talk So Your CISO Will Listen

To communicate effectively with your CISO, you’ll need to speak their language. Here’s how you can do that. The post How to Talk So Your CISO Will Listen appeared first on Security Boulevard. This article has been indexed from Security…

Boards are Finally Taking Cybersecurity Seriously

It’s time to ensure boards’ interest in cybersecurity goes beyond just conversation and into real action. The post Boards are Finally Taking Cybersecurity Seriously appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Survey Sees More Cyberattacks Targeting APIs

Despite increased vigilance, most organizations suffered an API security incident in the last 12 months. The post Survey Sees More Cyberattacks Targeting APIs appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…

Navigating the Nuances of the Asia-Pacific PDPA

Fundamental obligations of the Asia-Pacific Personal Data Protection Act (PDPA) for cybersecurity teams In the information age, the significance of data cannot be overstated, and cybersecurity legislation and standards govern its usage around the globe. Data fuels innovations, steers decisions,…

What Does Zero Trust Mean in Data Security?

Almost every heist movie has a sequence where elaborate plans are created to get the plotters past the heavily guarded perimeter of their target facility. Then, once they’re inside, they drop their disguises and walk around like they own the…

CJIS Security Awareness Training Cheat Sheet

Who’s the last organization you’d expect to be a cyberattack victim? If you answered law enforcement, you’d be correct—but the problem is, it’s happening right now. Police and law enforcement agencies are under cyber assault, and these developments put sensitive…

Playing Dress-Up? How to Train to Spot Websites in Disguise

With Halloween approaching, many are ready for ghosts and costumes. But online, the real threat is from websites masquerading as authentic—but aiming to deceive. Spoofed websites are insidious duplicates of genuine sites, aiming to trick users into sharing sensitive data…