Automated patch management is one important way to reduce the barrage of cyberattacks and guard against vulnerabilities. The post Automation Takes Off: A New Dawn for Enterprises to Guard Against the Cyberattack Barrage appeared first on Security Boulevard. This article…
Tag: Security Boulevard
Leveraging Escalation Attacks in Penetration Testing Environments – Part 2
Authors: George Raileanu and Eugene Mar In this post, we’ll cover the two most common ESC attacks we encounter on […] The post Leveraging Escalation Attacks in Penetration Testing Environments – Part 2 appeared first on Security Boulevard. This article…
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1
Authors: George Raileanu and Eugene Mar Introduction Together we aim to explore vulnerabilities within Active Directory Certificate Services (AD CS), […] The post Leveraging Escalation Attacks in Penetration Testing Environments – Part 1 appeared first on Security Boulevard. This article…
Mastering Cyber Risk Quantification Methods: A Strategic Approach
Quantitative Risk models have long been applied in the financial and insurable risk fields and are now being used extensively in cybersecurity. Quantifying risk helps manage risk by breaking it down and expressing it mathematically. Although models differ in methodology,…
Listen up: 10 cybersecurity podcasts you can learn from
Regardless of where you are in your career in cybersecurity – whether you have been a trusted expert for decades or are just starting out – it can be difficult to keep up with what’s happening in this fast-moving field.…
Digital natives are not cybersecurity natives
At TurkuSec meetup in April, I had the opportunity to share my insights on a pressing issue we’ve been researching lately at F-Secure: the cybersecurity challenges faced by digital natives. These are individuals who have grown up with fast internet…
Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for Data Security Posture Management report
San Mateo, Calif. – JUNE 6, 2024 – Symmetry Systems, the data+AI security company, today announced it has been named… The post Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for…
GHOSTENGINE Exploit: Vulnerable Drivers Facing Attack
A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at the GHOSTENGINE exploit in detail, shedding light on its modus…
Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for Data Security Posture Management report
San Mateo, Calif. – JUNE 6, 2024 – Symmetry Systems, the data+AI security company, today announced it has been named… The post Symmetry Systems Recognized as a Strong Performer in the 2024 Gartner® Peer Insights™ Voice of the Customer for…
IoT Security Means Remediation Not Mitigation
A topic that I recently got asked about was vulnerability mitigation for IoT systems, which shows that even within the security community there is still a belief that mitigation equals threat resolution. For IoT systems this simply does not work…
BTS #31 – Managing Complex Digital Supply Chains – Cassie Crossley
Cassie has a long history of successfully managing a variety of security programs. Today, she leads supply chain efforts for a very large product company. We will tackle topics such as software supply chain management, SBOMs, third-party supply chain challenges,…
Safeguarding AWS AI Services: Protecting Sensitive Permissions
As AI continues to grow in importance, ensuring the security of AI services is crucial. Our team at Sonrai attended the AWS Los Angeles Summit on May 22nd, where we noted how big of a role AI is going to…
Cybersecurity Training Reduces Phishing Threats – With Numbers to Prove It
Train people. It makes a difference. In organizations without security awareness training, 34% of employees are likely to click on malicious links or comply with fraudulent requests. The post Cybersecurity Training Reduces Phishing Threats – With Numbers to Prove It…
RansomHub Rides High on Knight Ransomware Source Code
RansomHub, which has become among the most prolific ransomware groups over the past few months, likely got its start with the source code from the Knight malware and a boost from a one-time BlackCat affiliate. The post RansomHub Rides High…
CEO Corner: Preparing for the Unavoidable – Why Incident Response Readiness is Non-Negotiable
Twenty years ago, I began my career in information security. It was all about firewalls (the heyday of Checkpoint), content filtering (remember Bluecoat) and anti-virus (Symantec and McAfee were the name of the game). We were monitoring our network with…
USENIX Security ’23 – HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
Authors/Presenters:Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…
How Poor Cryptographic Practices Endanger Banking Software Security
In today’s digital age, financial institutions rely heavily on encryption to protect sensitive data in their banking applications. However, despite the critical role of cryptography, many implementations suffer from fundamental flaws that create a false sense of security. Misconceptions about…
Why Digital Threats are the New Frontier in Executive Protection
The landscape of threats facing executives has expanded far beyond the physical realm, and home is the new attack surface. Traditional security measures, while still essential, are no longer sufficient on their own to protect high-profile individuals from the myriad…
MSPs Look to Streamline Cybersecurity Partnerships, Skills Shortage Persists
A rising volume of risks, shortage of qualified cybersecurity professionals and time management with vendors are among the challenges MSPs face. The post MSPs Look to Streamline Cybersecurity Partnerships, Skills Shortage Persists appeared first on Security Boulevard. This article has…
Certificate Lifecycle Management The Key to Robust Digital Security in Healthcare
The need for robust digital security has never been more critical. As cyber threats become increasingly sophisticated, managing digital certificates effectively is paramount for protecting sensitive information and ensuring seamless operations. The post Certificate Lifecycle Management The Key to Robust…