Tag: Security Boulevard

Just-in-Time Access: Key Benefits for Cloud Platforms

Just-in-time access has emerged as a game-changing approach to enhance the security posture of cloud environments. This innovative method aligns with the principle of least privilege, reducing the attack surface and minimizing potential security risks. The post Just-in-Time Access: Key…

AI-Powered Deepfake Scams Wreak Havoc on Businesses

More than half (53%) of businesses in the U.S. and UK have been targeted by financial scams using deepfake technology, with 43% of those companies falling victim, according to a Medius survey of 1,533 finance professionals. The post AI-Powered Deepfake…

Legal Impact of GDPR Data Policy Violations

GDPR violations can result in severe consequences. In its first year, over 89,000 data breaches were reported, leading to fines totaling €56 million. In 2019, the UK’s Information Commissioner’s Office (ICO) imposed record fines on British Airways (€183 million) and…

Eclypsium Product Roadmap

Join Eclypsium Product Manager, Joe Hopp, for an overview of new product updates and a preview of the features and solutions on the Eclypsium Supply Chain Security Platform roadmap. The post Eclypsium Product Roadmap appeared first on Eclypsium | Supply…

Randall Munroe’s XKCD ‘Slingshots’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2981/” rel=”noopener” target=”_blank”> <img alt=”” height=”420″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/569a573c-5093-4fc6-8070-0a82a0cdea73/slingshots.png?format=1000w” width=”397″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Slingshots’ appeared first on Security Boulevard. This…

USENIX Security ’23 – BunnyHop: Exploiting the Instruction Prefetcher

Authors/Presenters:Zhiyuan Zhang, Mingtian Tao, Sioli O’Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at…

The Foundation of Zero-Trust Security Architecture

For today’s IT organizations, establishing a zero-trust (ZT) architecture is an ongoing process of refinements for existing networks, resources, methods and security capabilities. The post The Foundation of Zero-Trust Security Architecture appeared first on Security Boulevard. This article has been…

Protecting NATO Secret and Foreign Government Information

We’ve talked a lot on this blog about protecting controlled unclassified information, and we’ve mentioned in places some other kinds of information, like classified and secret information, covered defense information, and other protected information. There’s one thing all of this…

Talking DSPM: Episode 4 – Dr. Mohit Tiwari

I’m Mohit Tiwari. I’m one of the co-founders of Symmetry Systems, and the CEO. Symmetry was spun out of Spark… The post Talking DSPM: Episode 4 – Dr. Mohit Tiwari appeared first on Symmetry Systems. The post Talking DSPM: Episode…

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing legitimate security software tools to run cyber campaigns against organizations. The post Threat Actors Abuse Red Team Tool MacroPack to…

Russian ‘WhisperGate’ Hacks: 5 More Indicted

Eaten by a GRU: Fake ransomware created by Russian GRU Unit 29155 attacked Ukraine and NATO—a month before the full scale invasion. The post Russian ‘WhisperGate’ Hacks: 5 More Indicted appeared first on Security Boulevard. This article has been indexed…

Overcoming the Challenges of Zero-Trust

Zero-trust, rooted in the principle of “never trust, always verify,” requires organizations to assume that every access request, whether internal or external, is potentially harmful. The post Overcoming the Challenges of Zero-Trust appeared first on Security Boulevard. This article has…

Why Are Organizations Losing the Ransomware Battle?

Axio Senior Cybersecurity Advisor, Richard Caralli’s recent article in Dark Reading, Why Are Organizations Losing the Ransomware Battle? examines the growing problem of ransomware attacks, emphasizing that many organizations are Read More The post Why Are Organizations Losing the Ransomware…

Randall Munroe’s XKCD ‘Lava Lakes’

<img alt=”” height=”272″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/5809f07f-b360-4679-a97e-feca717b5905/lava_lakes.png?format=1000w” width=”709″ /><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Lava Lakes’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Managing Certificate Chaos After Google’s Entrust Distrust

When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it unleashed an operational crisis for many organizations. If your business uses Entrust TLS certificates, you are facing one of two realities right…

An Introduction to Trackers and the Data They Collect

Trackers are everywhere and come in many different forms. Some tracking methods are more invasive than others; this post aims to explain what “trackers” are, how they work, and give examples of the data they collect. TABLE OF CONTENTS A…

BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar

IntroductionIn June 2024, Zscaler ThreatLabz detected fresh activity from BlindEagle, an advanced persistent threat (APT) actor also identified as AguilaCiega, APT-C-36, and APT-Q-98. BlindEagle predominantly focuses on organizations and individuals from the government and finance sector in South America, particularly…

RansomHub Emerges in Rapidly Evolving Ransomware Landscape

The ransomware space is becoming increasingly fragmented in the wake of law enforcement actions against BlackCat, LockBit, and others, spawning more threat groups and giving rise to prolific newcomers like RansomHub, according to a report by Searchlight Cyber. The post…

August Recap: New AWS Sensitive Permissions and Services

As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in August 2024. Our intention in sharing this is to…

FBI Warns of North Korea Attacks Against the Crypto Industry

  The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways.   Here is an example that the FBI is showcasing: 1.       A person from your dream company,…

Daniel Stori’s Turnoff.US: ‘pid 1’

<a class=” sqs-block-image-link ” href=”https://turnoff.us/geek/pid1/” rel=”noopener” target=”_blank”> <img alt=”” height=”618″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/bee1d45d-fc1a-4d7f-9a3b-fcb4165104a9/pid-1.jpeg?format=1000w” width=”640″ /> </a><figcaption class=”image-caption-wrapper”> via the inimitable Daniel Stori at Turnoff.US! Permalink The post Daniel Stori’s Turnoff.US: ‘pid 1’ appeared first on Security Boulevard. This article has been indexed…

Secure by Demand: Going Beyond Questionnaires and SBOMs

CISA’s Secure by Demand guidance provides a list of questions that enterprise software buyers should ask software producers to evaluate their security practices prior to, during and after procurement. It’s a good idea in principle as every organization needs to…

Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL?

USB MFA SCA😱: Infineon hardware and software blamed for timing side-channel attack on popular auth tokens. The post Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Bad Reasons to Update Your Linux Kernel

Linux kernel updates often include performance improvements and hardware compatibility. Regular kernel updates are crucial for patching vulnerabilities and protecting your system from cyberattacks. Live patching eliminates the need to reboot the system, avoiding service interruptions. Freshen up with something…

Debian Patches Two Dovecot Vulnerabilities

A recent discovery has exposed critical vulnerabilities in the Dovecot mail server, potentially allowing attackers to exploit the IMAP implementation and disrupt service. These vulnerabilities, identified as CVE-2024-23184 and CVE-2024-23185, can lead to denial-of-service (DoS) attacks by overwhelming the server…

Rubrik Allies to Cisco to Improve Cyber Resiliency

Rubrik and Cisco have allied to improve cyber resiliency by integrating their respective data protection and extended detection and response (XDR) platforms. The post Rubrik Allies to Cisco to Improve Cyber Resiliency appeared first on Security Boulevard. This article has…

Randall Munroe’s XKCD ‘Sky Alarm’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2979/” rel=”noopener” target=”_blank”> <img alt=”” height=”302″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0992675d-5dfb-44f5-9f91-f17687c070a1/sky_alarm.png?format=1000w” width=”332″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Sky Alarm’ appeared first on Security Boulevard.…

Snyk Allies With Snowflake to Improve Data Security

Snyk and Snowflake have allied to make it simpler for cybersecurity teams to analyze the security posture of their IT environments using data hosted in the cloud. The post Snyk Allies With Snowflake to Improve Data Security appeared first on…

SaaS Security: Are You Moving Fast Enough?

The slow adoption of SaaS security could catch organizations off guard because SaaS operates at a different pace than traditional software. The post SaaS Security: Are You Moving Fast Enough? appeared first on Security Boulevard. This article has been indexed…

Is the “Network” Defendable?

Is the network defendable? This serious question is often conveniently left unasked because the answer is uncomfortable. On June 3, 1983, the day before I graduated from high school, MGM released the movie “War Games”.  For those who never saw…

Qilin Ransomware Attack Used To Steal Chrome Browser Data

In the cyberthreat landscape, Qilin ransomware attack has recently been observed stealing credentials in Chrome browsers. Reports claim that these credentials are being acquired using a small set of compromised end points. In this article, we’ll cover how the attack…

Ubuntu Patches Multiple Vim Vulnerabilities

Recently, Canonical has released security updates to address multiple Vim vulnerabilities in Ubuntu 14.04 ESM. Ubuntu 14.04, codenamed “Trusty Tahr,” reached its end-of-life (EOL) on April 30, 2019. After this date, Canonical stopped providing official updates, including security patches, for…

WordPress Sites at Risk from WPML Flaw

WordPress is the most widely used content management system globally, with over 478 million of all websites are built on its platform, according to its developers. However, this widespread popularity also makes WordPress a prime target for malicious actors. Because of…

Data Breaches for the Month August 2024

This month has been a challenging month for organizations worldwide as several high-profile data breaches occur and become headlines. These incidents have not only exposed sensitive information but also highlighted… The post Data Breaches for the Month August 2024 appeared…

Ubuntu Fixes Several Linux Kernel AWS Vulnerabilities

Several vulnerabilities in the Linux kernel have been identified, also affecting Amazon Web Services (AWS) systems. Canonical has released important security patches addressing these vulnerabilities. These flaws primarily involve race conditions and memory management errors, which can be exploited to…

Happy United States Labor Day 2024 / Feliz Fin de Semana del Día del Trabajo de Estados Unidos 2024 / Joyeux Fin de Semaine de la Fête du Travail aux États-Unis 2024

<a class=” sqs-block-image-link ” href=”https://www.dol.gov/” rel=”noopener” target=”_blank”> <img alt=”” height=”543″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/4b74c31d-aa0e-4a31-99fe-80119945ba60/Lady%2BMachinists.jpg?format=1000w” width=”700″ /> </a><figcaption class=”image-caption-wrapper”> Happy Labor Day 2024 – Three Day Weekend Edition! Permalink The post Happy United States Labor Day 2024 / Feliz Fin de Semana del Día…

Happy United States Labor Day Weekend 2024 / Feliz Fin de Semana del Día del Trabajo de Estados Unidos 2024 / Joyeux Fin de Semaine de la Fête du Travail aux États-Unis 2024

<a class=” sqs-block-image-link ” href=”https://www.dol.gov/” rel=”noopener” target=”_blank”> <img alt=”” height=”370″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e8e475af-7b97-4454-9315-101fb8cbf39d/Happy+Labor+Day.png?format=1000w” width=”561″ /> </a> Permalink The post Happy United States Labor Day Weekend 2024 / Feliz Fin de Semana del Día del Trabajo de Estados Unidos 2024 / Joyeux Fin…

4 Tips for Optimizing Your GRC Strategy

Why GRC strategies are often not as effective as they could be, and specific practices businesses can adopt to improve GRC operations. The post 4 Tips for Optimizing Your GRC Strategy appeared first on Security Boulevard. This article has been…

Modern Strategies for IoT Device Fingerprinting

The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management. The post Modern Strategies for IoT Device Fingerprinting appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Missing Guardrails, a Troubling Trend in Data Protection

An estimated 2.7 billion personal records were stolen from National Public Data (NPD), a Florida-based data broker company that collects and sells personal data for background checks. The post Missing Guardrails, a Troubling Trend in Data Protection appeared first on…

ASPM and Modern Application Security

Gartner’s 2024 Hype Cycle for Application Security: ASPM moves from peak to trough. The post ASPM and Modern Application Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: ASPM and Modern…

US CERT Alert AA24-242A (RansomHub Ransomware)

RansomHub is a ransomware-as-a-service variant—formerly known as Cyclops and Knight—that has established itself as an efficient and successful service model. The post US CERT Alert AA24-242A (RansomHub Ransomware) appeared first on SafeBreach. The post US CERT Alert AA24-242A (RansomHub Ransomware)…

Randall Munroe’s XKCD ‘Stranded’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2978/” rel=”noopener” target=”_blank”> <img alt=”” height=”323″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/241c900a-73ba-4bdb-8b8c-e43be64814db/stranded.png?format=1000w” width=”219″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Stranded’ appeared first on Security Boulevard. This…

Veeam Widens Beam to MongoDB, Nutanix & Proxmox VE

Veeam has shown evidence of its capabilities to provide backup, recovery and cybersecurity across an increasing number of heavyweight cloud platforms, databases and service layers including MongoDB and Nutanix. The post Veeam Widens Beam to MongoDB, Nutanix & Proxmox VE…

Top 5 Cyber Security Companies in Mumbai

As businesses increasingly rely on technology, the role of cyber security companies has become essential. In Mumbai, cybersecurity firms are growing in importance as they help defend against rising cyber threats like data breaches and ransomware attacks, affecting businesses and…

The Role of AI in Enhancing Patient Experience in HealthTech

Artificial Intelligence (AI) is revolutionizing healthcare, and its impact on patient experience is nothing short of transformative. According to a study by Accenture, AI applications…Read More The post The Role of AI in Enhancing Patient Experience in HealthTech appeared first…