Tag: EN

The Pros and Cons of Secure Access Service Edge (SASE)

Software-Defined Wide Area Network (SD-WAN) manages and optimizes the delivery of network services across multiple locations. Secure Web Gateway (SWG) protects users from web-based threats by filtering malicious content, including malware, phishing attempts, and unauthorized websites. Zero Trust Network Access…

Turla: A Master’s Art of Evasion

Turla, a well-known piece of malware, has taken to weaponising LNK-files to infect computers. We have observed a current example of this. Learn more about the details in this article! This article has been indexed from Security Blog G Data…

Europol says mobile roaming tech is making its job too hard

Privacy measures apparently helping criminals evade capture Top Eurocops are appealing for help from lawmakers to undermine a privacy-enhancing technology (PET) they say is hampering criminal investigations – and it’s not end-to-end encryption this time. Not exactly.… This article has…

Understanding API Key Verification

As organizations look to improve their API security, two distinct approaches to API key verification have emerged — centralized and decentralized verification. The post Understanding API Key Verification appeared first on Security Boulevard. This article has been indexed from Security…

Twilio data breach exposes millions of contact numbers

Users of Twilio, the cloud-based communication service provider, are being alerted to a security breach affecting Authy, its platform for multi-factor authentication. It has been reported that a threat actor successfully accessed Authy’s end servers, potentially compromising user phone number…

Understanding the Risks to SaaS Data Security

Software as a Service (SaaS) has revolutionized how businesses operate by offering convenient, scalable, and cost-effective solutions for various operational needs. However, the widespread adoption of SaaS also brings significant challenges and risks, particularly concerning data security. 1. Data Breaches…

Smashing Silos With a Vulnerability Operations Center (VOC)

VOC enables teams to address the vulnerabilities that present the greatest risk to their specific attack surface before they can be exploited. The post Smashing Silos With a Vulnerability Operations Center (VOC) appeared first on Security Boulevard. This article has…

Infostealing malware masquerading as generative AI tools

Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile banking funds, whether in the form of ‘traditional’ banking malware or, more recently, cryptostealers, according to ESET. Vidar infostealer targets…

47% of corporate data stored in the cloud is sensitive

As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%) cited as the leading categories…

New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks

Cybersecurity researchers have uncovered a new botnet called Zergeca that’s capable of conducting distributed denial-of-service (DDoS) attacks. Written in Golang, the botnet is so named for its reference to a string named “ootheca” present in the command-and-control (C2) servers (“ootheca[.]pw”…

Organizations weigh the risks and rewards of using AI

78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk assessment The report, based on a survey of over 400 security professionals in the US involved in…

Hackers Abused Twilio API To Verify Phone Numbers used For MFA

An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the endpoint has been secured to prevent unauthorized access.  No evidence suggests the attackers gained access to internal systems or other…