As enterprises brace for a new wave of stealthy intrusions — so-called Typhoon attacks — security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat…
Category: Security Boulevard
ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a “massive security loophole” in the operating…
Data in Danger: Detecting Cross-Site Scripting in Grafana
Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform. The post Data in Danger: Detecting Cross-Site Scripting in Grafana appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Harness Adds Traceable WAAP to Secure Web Apps and APIs
Harness today unfurled a cloud web application and application programming interface (API) protection (WAAP) platform that makes it simpler for security operation (SecOps) teams to defend application environments. The post Harness Adds Traceable WAAP to Secure Web Apps and APIs…
HYCU Tackles SaaS Data Protection With New R-Shield Solution
HYCU introduces R-Shield to provide comprehensive cyber resilience across SaaS, cloud, and on-premises environments as organizations face growing supply chain attacks. The post HYCU Tackles SaaS Data Protection With New R-Shield Solution appeared first on Security Boulevard. This article has…
Beyond Backups: Building a Ransomware Response Playbook That Works
Organizations must avoid relying solely on traditional backups because ransomware attacks are occurring more often and becoming more expensive and complex. The post Beyond Backups: Building a Ransomware Response Playbook That Works appeared first on Security Boulevard. This article has…
GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets Detection
As cyber threats in healthcare continue to evolve, GitGuardian strengthens its commitment to the sector by joining Health-ISAC and offering members enhanced secrets detection capabilities to protect sensitive data. The post GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets…
Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact
Adversary-in-the-middle fraud (AiTM) represents a significant, ongoing challenge for businesses, with tactics like email hijacking, AI attacks and account takeovers becoming increasingly complex. The post Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact appeared first on Security Boulevard. This…
Why Smart Retrieval is Critical for Compliance Success
Let’s explore how four key elements can significantly improve how organizations find and use compliance documentation. The post Why Smart Retrieval is Critical for Compliance Success appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
The Human Advantage in the Age of Technological Uncertainties
Our excessive reliance on technology has disabled us from crossing the barriers to experience, sense, and relate with others the way we used to. The post The Human Advantage in the Age of Technological Uncertainties appeared first on Security Boulevard.…
Securing AI Innovation Without Sacrificing Pace – FireTail Blog
Apr 23, 2025 – – AI security is a crtical issue in today’s landscape. With developers, teams, employees and lines of business racing ahead to compete, security teams consistently fall short in an ecosystem where new risks are rising up…
Stay Proactive with Advanced Secrets Management
Why is Proactive Cybersecurity Crucial? Where machine identities take center stage, the need for advanced secrets management is more crucial than ever. The rise of key management failures, token compromises, and password leaks are some of the telltale signs of…
Gain Confidence in Your IAM Strategies
What Makes for Effective IAM Strategies? IAM (Identity and Access Management) strategies have become a cornerstone element, focusing on the protection of critical assets through superior access control and user authentication. But the question is, how can organizations incorporate IAM…
Are Your Secrets Properly Protected?
Implementing Strategic Non-Human Identity Management for Sensitive Data Protection Are your organization’s secrets safe? How comprehensive is your strategy for securing your Non-Human Identities (NHIs) and their secrets? Businesses must aim to eliminate data leaks and security breaches by incorporating…
BSidesLV24 – Common Ground – Securing Your Cloud-Native DevOps: A Zero Trust Approach
Author/Presenter: Emma Fang Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…
Unifying Identity Signals: Turning Breach Data into Actionable Identity Intelligence
The Fragmentation Problem in CTI and OSINT Investigations Cyber threat intelligence (CTI) and open-source intelligence (OSINT) workflows are often flooded with fragmented identity data – leaked credentials, infostealer logs, dark web posts, and forum aliases. While this data holds enormous…
Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber
ATT&CK v17 We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v17 version of MITRE ATT&CK. Like we do with every ATT&CK update, we’ve done the heavy lifting to analyze the…
Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report
Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar The post Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
Delinea Adds Ability to Secure AI Agent Identities
Delinea today extended the reach of its platform for securing identities and credentials to now provide support for artificial intelligence (AI) agents. The post Delinea Adds Ability to Secure AI Agent Identities appeared first on Security Boulevard. This article has…
Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today
By performing a cryptographic key assessment (CKA), developing a PQC encryption strategy and prioritizing cryptoagility, organizations can prepare for quantum computing cyberthreats. The post Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today appeared first on Security Boulevard. This article has been…