Tag: Security Boulevard

Webinar Recap: Cybersecurity Trends to Watch in 2024

Predicting the future of cybersecurity is an impossible task, but getting some expert advice doesn’t… The post Webinar Recap: Cybersecurity Trends to Watch in 2024 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

HYAS Threat Intel Report April 1 2024

Weekly Threat Intelligence Report Date: April 1, 2024 Prepared by: David Brunsdon, Threat Intelligence – Security Engineer, HYAS Each week, we are sharing what we are seeing in our HYAS Insight threat intelligence and investigation platform, specifically a summary of…

Confidence in the Cloud Starts With Visibility and Zero-Trust

The only way organizations can really protect cloud-based IT environments is by putting zero-trust into practice. The post Confidence in the Cloud Starts With Visibility and Zero-Trust appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Ethics of Cyber Security: To Disclose or Not?

In a recent panel discussion, a thought-provoking question was posed to us, one that delves into the murky waters of cyber security and governmental responsibility. The query centered on the obligation of governments regarding the vulnerabilities they discover and utilize for intelligence…

New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues

In episode 323, the hosts discuss two prominent topics. The first segment discusses a significant vulnerability discovered in hotel locks, branded as ‘Unsaflok,’ affecting 3 million doors across 131 countries. The vulnerability allows attackers to create master keys from a…

XZ Utils Backdoor Vulnerability (CVE-2024-3094) Advisory

Overview NSFOCUS CERT recently detected that a backdoor vulnerability in XZ Utils (CVE-2024-3094) was disclosed from the security community, with a CVSS score of 10. Because the SSH underlying layer relies on liblzma, an attacker could exploit this vulnerability to…

Cybersecurity Tabletop Exercises: How Far Should You Go?

With global cyber threats and other international tensions growing, what scenarios should state and local governments consider when conducting exercises to test their people, processes and technology?   The post Cybersecurity Tabletop Exercises: How Far Should You Go? appeared first…

‘Darcula’ PhaaS Campaign Sinks Fangs into Victims

A sprawling phishing-as-a-service (PhaaS) campaign that has been running since at least last summer is using more than 20,000 fake domains to target a wide range of organizations in more than 100 countries, illustrating the capabilities of an increasingly popular…