Tag: Security Boulevard

Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked

Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts. The post Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked appeared first on Security Boulevard. This article has been…

Risks of poor PKI management

Public Key Infrastructure (PKI) is essential for businesses to maintain data security and protect digital communications. However, implementing a PKI is just the first step—you must support it with proper ongoing management to reap the benefits and prevent security exposures.…

Growing Cyber Threats Amid Israel-Palestine Tensions

Growing Cyber Threats Focus on Ransomware, Infostealers, and Defacements This blog continues our geopolitical series, highlighting the growing cyber threats during the ongoing Israel-Palestine tensions. Recent months have seen a significant increase in cyberattacks targeting Israeli institutions, with a particular…

Cloud Penetration Testing: Tools, Methodology & Prerequisites

Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical functions. While the cloud offers scalability and agility, it also introduces new security challenges. Cloud penetration testing is a crucial defence mechanism for proactively identifying and addressing these vulnerabilities.…

A Comprehensive Guide to API Penetration Testing

  What is API Penetration Testing? API penetration testing, or API pentesting, is a specialised form of security testing focused on identifying and addressing security vulnerabilities within an API (Application Programming Interface). APIs are the backbone of modern web applications,…

Ghostwriter v4.2

Ghostwriter v4.2: Project Documents & Reporting Enhancements After April’s massive Ghostwriter v4.1 release, we received some great feedback and ideas. We got a little carried away working on these and created a release so big we had to call it…

Fortinet to Expand AI, Cloud Security with Lacework Acquisition

Fortinet, known for network security capabilities within its Fortinet Security Fabric cybersecurity platform, is bolstering its AI and cloud security capabilities with the planned acquisition of Lacework and its AI-based offerings. The companies announced the proposed deal Monday, with expectations…

Tips to prevent data breaches

Tips to Prevent Data BreachesCould the Ticketmaster Data Breach Been Prevented?In a recent regulatory filing to the US Securities And Exchange Commission (SEC) , Live Nation, the parent company of Ticketmaster, revealed a distressing development: a criminal threat actor attempted…

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The Colorado Privacy Act (CPA), signed into law on July 7, 2021, is a comprehensive privacy legislation that aims to enhance data privacy rights for residents of Colorado. The CPA provides consumers with greater…

Utah Consumer Privacy Act (UCPA)

What is the Utah Consumer Privacy Act? The Utah Consumer Privacy Act, or UCPA, is a state-level data privacy law enacted in Utah, USA, aimed at providing residents with greater control over their personal data. The UCPA shares similarities with…

Identity Data Automation: The What and Why

A discussion on why existing IGA projects are often in distress and how a more agile data automation approach can streamline process and improve application connectivity. The post Identity Data Automation: The What and Why appeared first on The Cyber…