The rise of agentic AI is accelerating. But as enterprises embrace AI autonomy, a critical question looms – how well is security keeping up? The post Agentic AI Enhances Enterprise Automation: Without Adaptive Security, its Autonomy Risks Expanding Attack Surfaces…
Category: Security Boulevard
Shadows Within Shadows: How AI is Challenging IT
S04 EP 04: Island’s Chief Customer Officer, Bradon Rogers, chats shadow IT and how AI is compounding the issue. The post Shadows Within Shadows: How AI is Challenging IT appeared first on Security Boulevard. This article has been indexed from…
CaaS: The Key to More Affordable Cyber Insurance
Compliance as a Service (CaaS) strengthens a company’s posture and defensibility, making it more attractive to insurers. The post CaaS: The Key to More Affordable Cyber Insurance appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
China, Russia, North Korea Hackers Exploit Windows Security Flaw
Amost a dozen state-sponsored threat groups from Russia, China, and North Korea have been exploiting a security flaw in WIndows in attacks on governments and critical infrastructure that date back to 2017. According to Trend Micro’s VDI unit, Microsoft has…
From Cloud Native to AI Native: Lessons for the Modern CISO to Win the Cybersecurity Arms Race
By adopting AI Native security operations, organizations gain a formidable defense posture and streamline their use of human talent for the most challenging, creative and impactful tasks The post From Cloud Native to AI Native: Lessons for the Modern CISO…
Red Canary Report Surfaces Sharp Increase in Cyberattacks Involving Identity
An analysis of 93,000 threats published this week by Red Canary, a provider of a managed detection and response (MDR) service, finds the number of cyberattacks seeking to compromise an identity increased by a factor of four in 2024. The…
How Data Visualization Helps Prevent Cyber Attacks
Cybersecurity Relies on Visualization Raw data often tells a story that’s hidden in plain sight. No matter how accurate or comprehensive, numbers on a spreadsheet can easily blur into an incomprehensible haze when patterns and anomalies are buried deep within…
Why No-Reply Emails Are a Cybersecurity Hazard
No-reply emails may seem convenient, but they pose serious cybersecurity risks. Learn how they enable phishing, spoofing, and financial fraud—and how to protect your business. The post Why No-Reply Emails Are a Cybersecurity Hazard appeared first on Security Boulevard. This…
News alert: SpyCloud study shows Darknet identity exploitation arising to become a primary cyber risk
Austin, TX, Ma. 19, 2025, CyberNewswire — The average corporate user now has 146 stolen records linked to their identity, an average 12x increase from previous estimates, reflecting a surge in holistic identity exposures. SpyCloud, the leading identity threat ……
News alert: SecPod launches ‘Saner Cloud’ — CNAPP platform for real-time, automated security
Bengaluru, India, Mar. 19, 2025, CyberNewswire — SecPod, a global cybersecurity provider, has announced the General Availability of Saner Cloud, a Cloud-Native Application Protection Platform designed to provide automated remediation and workload security across multi-cloud environments. Unlike conventional security ……
News alert: Knocknoc raises seed funding to scale its just-in-time network access control technology
Sydney, Australia, Mar. 19, 2025, CyberNewswire — Sydney-based cybersecurity software company Knocknoc has raised a seed round from US-based venture capital firm Decibel Partners with support from CoAct and SomethingReal. The funding will support go-to-market, new staff, customer onboarding and…
Why So Many Employee Phishing Training Initiatives Fall Short
During the work-from-home boom of 2020, GitLab, a company that largely employs tech-savvy individuals, decided to test its security by sending fake phishing messages to its WFH workers. About one out of every five tested employees fell for it, and…
How can I extend IAM frameworks to include NHIs effectively?
Are Non-Human Identities the Missing Piece in Your IAM Framework? Your job is likely dominated by securing human identities. But, have you taken a moment to consider the significant role that Non-Human Identities (NHIs) play in your cloud security strategy?…
DEF CON 32 – Recon Village – SWGRecon: Automating SWG Rules, Policies & Bypasses
Speaker: Vivek Ramachandran Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…
Trend Micro Open Sources Cybertron LLM for Cybersecurity
Trend Micro today announced it will open source a Cybertron large language model (LLM) specifically trained to automate a wide range of cybersecurity tasks. The post Trend Micro Open Sources Cybertron LLM for Cybersecurity appeared first on Security Boulevard. This…
HP Intros Printers with Protection Against Quantum Cyberattacks
HP this week introduced new HP printers that include protections against cyberthreats posed by future quantum computers, which could arrive earlier than expected thanks to recent developments. With the new printers, HP also is addressing connected devices that often are…
HUMAN Security Applies AI to Combatting Malicious Bots
HUMAN Security this week revealed it is applying artificial intelligence (AI) and data modeling to bot management as part of an effort to provide cybersecurity teams more granular insights into the origins of cyberattacks. The post HUMAN Security Applies AI…
DEF CON 32 – Recon Village – OWASP Amass: Expanding Data Horizons
Instructor: Jeff Foley Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…
Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
Overview Recently, NSFOCUS CERT detected that Microsoft released a security announcement and fixed the spoofing vulnerability of Windows File Explorer (CVE-2025-24071), with a CVSS score of 7.5. Due to the implicit trust and automatic file parsing behavior of .library-ms files…
Data Leaks and AI Agents: Why Your APIs Could Be Exposing Sensitive Information
Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to experiment with it, using tools like chatbots. Others, however, have integrated agentic AI directly into their business procedures and APIs.…