Tag: Security Boulevard

Beneath the Shadows: DarkGate

Join us as we uncover DarkGate, a malevolent force that strikes fear into the hearts of organizations worldwide. DarkGate has morphed into a sophisticated adversary, utilizing Drive-by Downloads and DanaBot deployment to wreak havoc. But fear not! With AttackIQ Flex…

Escape vs Burp Suite Enterprise

Explore why customers prefer Escape over Burp Suite Enterprise, weigh the advantages and disadvantages of both,and determine the best fit for you The post Escape vs Burp Suite Enterprise appeared first on Security Boulevard. This article has been indexed from…

One More Time on SIEM Telemetry / Log Sources …

One More Time on SIEM Telemetry / Log Sources … (cross posted from Dark Reading, and inspired by a previous version of this blog) Cyberpunk IT telemetry via Dall-E For years, organizations deploying Security Information and Event Management (SIEM) or similar tools have…

Complex Supply Chain Attack Targets GitHub Developers

Unidentified threat actors used multiple tactics to launch a sophisticated software supply-chain campaign targeting developers on the GitHub platform, including members of the popular Top.gg community that includes more than 170,000 members. The attackers used a range of tactics and…

Telegram Privacy Nightmare: Don’t Opt In to P2PL

Scary SMS shenanigans: Avoid Telegram’s new “Peer-To-Peer Login” program if you value your privacy or your cellular service. The post Telegram Privacy Nightmare: Don’t Opt In to P2PL appeared first on Security Boulevard. This article has been indexed from Security…

Cyber readiness and SBOMs

The Advanced Technology Academic Research Center (ATARC) recently hosted the webinar “Unlocking Cyber Readiness with SBOMs,” focusing on the essential role of software bills of materials (SBOMs) in enhancing cybersecurity frameworks across various government agencies and private-sector organizations. The post…

What is Managing Secrets?

Managing secrets involves securely orchestrating a variety of digital authentication credentials, crucial for safeguarding access to applications, services, and critical systems. These credentials, commonly referred to as ‘secrets,’ encompass a wide range of credentials, certificates, and keys. This includes passwords…

Embrace Generative AI for Security, But Use Caution

Generative AI will be a net positive for security, but with a large caveat: It could make security teams dangerously complacent. The post Embrace Generative AI for Security, But Use Caution appeared first on Security Boulevard. This article has been…

US, UK Accuse China of Years-Long Cyberespionage Campaign

The United States, the UK, and other countries this week accused a state-sponsored Chinese threat group of running a massive global hacking campaign for more than a decade that targeted political figures, journalists, businesses, political dissidents, and elections officials to…

Cybersecurity a Top Priority for Audit Committees

Audit committees consider cybersecurity their primary oversight focus as the SEC enforces tougher cyberattack disclosure regulations. The post Cybersecurity a Top Priority for Audit Committees appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

NIST NVD “Under Construction”

In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024, a prominent notice has adorned the NVD’s main page, signaling disruptions in vulnerability management. It reads: “NIST is currently working to establish a…

The Best 10 Vendor Risk Management Tools

Let’s discuss an acronym reshaping the business world: Vendor Risk Management, or VRM. Once an abbreviation that few knew the meaning of, VRM is now a basic component of responsible business processes. In our interconnected world, our security is only…