Overview Recently, we decided to perform some reverse engineering of the SonicWall NSv appliance to identify any potential remote code execution vulnerabilities within the appliance. During our initial analysis of a virtual machine image for the application, we discovered a…
Tag: Security Boulevard
What the Future Holds for Data Security
With the proliferation of data in all aspects of life, from personal information to business operations, its protection becomes more critical than ever. The post What the Future Holds for Data Security appeared first on Security Boulevard. This article has…
AI and Quantum Computing Threaten Encryption and Data Security
The combination of AI and quantum computing in the wrong hands are enough of a security concern to give pause to even the most experienced technologists. The post AI and Quantum Computing Threaten Encryption and Data Security appeared first on…
“Do Not Push To Production” And Other Insecure Code, Demonstrated By An Ethical Hacker
Enjoy highlights from GitGuardian’s ethical hacking webinar with a friend from Snyk. The post “Do Not Push To Production” And Other Insecure Code, Demonstrated By An Ethical Hacker appeared first on Security Boulevard. This article has been indexed from Security…
Konni Malware Alert: Uncovering The Russian-Language Threat
In the ever-evolving landscape of cybersecurity, a recent discovery sheds light on a new phishing attack being dubbed the Konni malware. This cyber assault employs a Russian-language Microsoft Word document malware delivery as its weapon of choice, delivering a potent…
Leveraging Automation for Risk Compliance in IT
Organizations often encounter the challenge of managing complex technology ecosystems while ensuring data security, compliance, and risk management. One crucial aspect of this challenge is risk compliance in IT environments, specifically Linux systems. However, maintaining risk compliance can be…
RSA Keys Security: Insights from SSH Server Signing Errors
In the realm of secure communication protocols, RSA keys play a pivotal role in safeguarding sensitive information. Recently, a group of researchers from prominent universities in California and Massachusetts uncovered a vulnerability in the SSH (secure shell) protocol, shedding light…
Bolstering API Security: Introducing Wallarm’s API Attack Surface Management (AASM)
In the fast-paced digital world, think of Application Programming Interfaces (APIs) as the threads that stitch together the fabric of our tech ecosystems. They’re often overlooked, quietly ensuring that your apps communicate seamlessly and keep the digital world running smoothly.…
75% Organizations Struggle with Recurring Cyber Attacks
In a time when advancements in technology rule these days, the constant risk of cyber attacks hangs over businesses all over the world. As part of the ‘Mind of the CISO: Behind the Breach’ project, Trellix, recently performed research. This…
Beware of Expired or Compromised Code Signing Certificates
Given the alarming rise in software supply chain attacks and consumers growing more cyber-aware and security-conscious, software providers need to demonstrate a stronger commitment to securing their software and applications and fostering user confidence and trust. One of the vital…
Customer Story | How Azusa Unified School District Increasing Visibility & Control in Google & Microsoft 365
Azusa’s technology team reduces phishing and other cyber risks in the cloud with ManagedMethods’ Cloud Monitor Background Like many school districts, state-of-the-art technology is at the forefront of Azusa Unified’s educational mission. And, as Director of Technology, it’s Manuel Sanchez’s…
The Importance of Incident Response for SaaS
The importance of a thorough incident response strategy cannot be understated as organizations prepare to identify, investigate, and resolve threats as effectively as possible. Most security veterans are already well aware of this fact, and their teams have proactively defined…
Network Infrastructure in Ransomware’s Crosshairs: Addressing Supply Chain Threats
In 2023, ransomware continues to do even more damage. Despite efforts to disrupt ransomware operations, criminal groups adapt including their tactics and techniques. One of the major developments in 2023 is a focus on network devices—such as ADCs, firewalls, and…
DEF CON 31 War Stories – Paz Hameiri’s ‘CON Trolling The Weather’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Randall Munroe’s XKCD ‘Typical Seating Chart’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2862/”> <img alt=”” height=”943″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/78a18e0d-88c3-4d7c-8bb1-77bb8b9e98a5/typical_seating_chart.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD! Permalink The post Randall Munroe’s XKCD ‘Typical Seating Chart’ appeared first on Security Boulevard.…
Exposed Hugging Face APIs Opened AI Models to Cyberattacks
Security flaws found in both Hugging Face and GitHub repositories exposed almost 1,700 API tokens, opening up AI developers to supply chain and other attacks and putting a brighter spotlight on the need to ensure that security keeps up with…
P2PInfect Botnet Is Now Targeting MIPS-Based IoT Devices
The operator behind the growing P2PInfect botnet is turning their focus to Internet of Things (IoT) and routers running the MIPS chip architecture, expanding their list of targets and offering more evidence that the malware is an experienced threat actor.…
Building a Collaborative Approach to Secure the Connected World
The expanding IoT landscape demands a collaborative approach to PKI, ensuring seamless security across diverse domains. The post Building a Collaborative Approach to Secure the Connected World appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Limiting Remote Access Exposure in Hybrid Work Environments
With the rise in remote and distributed work, companies find it increasingly difficult to manage their attack surface at the speed and scale necessary to prevent cyberattacks. The post Limiting Remote Access Exposure in Hybrid Work Environments appeared first on…
2023’s Dark Horse Cyber Story: Critical Infrastructure Attacks
There are several cybersecurity trends that truly deserve top attention when we look back at 2023 — and they will get it. Meanwhile, cyber attacks against critical infrastructure quietly grow, despite a lack of major attention. The post 2023’s…