Welcome to the first episode of The Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec Elephants in the room. The post The Elephant in AppSec Podcast⎥Lack of effective DAST tools⎥Aleksandr Krasnov (Meta, Thinkific, Dropbox) appeared…
Tag: Security Boulevard
What Is The Cyber Kill Chain? Process & Model
Grasping the Fundamentals: A Study of the Cyber Harm Ladder Navigating the multifaceted universe of cybersecurity is similar to solving an evolving labyrinth. This world is awash with intricate principles and techniques; with the Cyber Harm Ladder gaining increasing focus…
Different Types of CISOs, Diverse Missions
There are a range of distinct roles/missions that hold the CISO title. Their ultimate goals are similar, but how they are positioned to do that varies. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard. This…
DarkCasino WinRAR Exploit: A New APT Threat Emerges
In a recent cybersecurity revelation, a formidable and highly sophisticated cyber threat has surfaced, going by the name DarkCasino. Initially perceived as a phishing campaign orchestrated by the EvilNum group, recent analyses by cybersecurity firm NSFOCUS have reclassified DarkCasino as…
AlmaLinux Under the Hood: Key Features Every System Administrator Should Know
System administrators face the continuous challenge of ensuring reliability, security, and efficiency in their IT environments. One solution that is increasingly gaining traction is AlmaLinux. This open-source enterprise-level Linux distribution is tailored to meet the demanding needs of system administrators…
Detecting AiTM Phishing Sites with Fuzzy Hashing
Background In this blog, we will cover how Obsidian detects phishing kits or Phishing-as-a-Service (PhaaS) websites for our customers by analyzing the fuzzy hashes of visited website content. This concept draws from prior industry art, as IOCs (ex: SHA-1/SHA-265) and…
Strengthening Cybersecurity to Enhance Compliance: The Splunk and CrowdStrike Advantage
In today’s digital age, businesses constantly face unprecedented cybersecurity challenges. The ever-evolving threat landscape, stringent regulatory requirements, and the growing volume of sensitive data make safeguarding your organization’s data a top priority. Fortunately, you can leverage advanced cybersecurity solutions to…
“Known Good” or “Known Bad”: Choosing a Starting Point for OT Cybersecurity
One way to characterize a cybersecurity strategy is by whether it takes action based on the definition of “known good” activity or “known bad” activity. The “known bad” approach attempts to identify threats by monitoring activity (network requests, user actions,…
The Underestimated Value of Security in Selecting Corporate Real Estate
Choosing office facilities involves far more than evaluating rent and location. In the current landscape of seemingly escalating workplace violence, prioritizing workplace safety has never been more important. Security teams play a pivotal role in shaping the work environment, strategically…
Federal Judge Lets FTC Continue with Restrictions Against Meta
A federal court judge gave U.S. regulators the green light to prohibit Meta from monetizing the data its various entities – including Facebook and Instagram – collect from users under the age of 18, one of several restrictions the Federal…
Okta Screws Up (Yet Again) — ALL Customers’ Data Hacked, not just 1%
You had one job: Last month’s sheer incompetence descends this week into UTTER FARCE. The post Okta Screws Up (Yet Again) — ALL Customers’ Data Hacked, not just 1% appeared first on Security Boulevard. This article has been indexed from…
N. Korean Threat Groups Mixing Tactics to Evade Detection
Researchers with Google-owned Mandiant last month wrote about increasing collaboration among North Korea-supported threat groups as one indication of a larger evolution of the regime’s offensive cyber program. The half-dozen or so state-sponsored cyberthreat groups associated with North Korea have…
5 Security Risks of Responsive Web Design
The very features that make responsive web design (RWD) so flexible can also introduce new security vulnerabilities if not properly managed. The post 5 Security Risks of Responsive Web Design appeared first on Security Boulevard. This article has been indexed…
Strata Identity’s Maverics Achieves SOC 2 Type II Certification
MEDIA ADVISORY Standard Validates that Maverics Identity Orchestration Meets the Highest Standards for Security, Availability, and Confidentiality BOULDER, Colo., Nov.29, 2023 – Strata Identity, the Identity Orchestration company, today announced that the Maverics Identity Orchestration Platform™ received a System and…
3 Reasons to Consider Reskilling to a Role in Cybersecurity
Here are three major reasons why workers should consider upskilling to a new career in the cybersecurity field. The post 3 Reasons to Consider Reskilling to a Role in Cybersecurity appeared first on Security Boulevard. This article has been indexed…
Web Security 101 – Best Practices and Solutions
Web security is an umbrella term for internet security which includes website security – the practice of safequaring your website against attacks. The post Web Security 101 – Best Practices and Solutions appeared first on Security Boulevard. This article has…
Intel Reptar Flaw Patch For CPU Vulnerability Released
Intel recently released multiple fixes for a high-severity vulnerability dubbed Reptar. The CVE-2023-23583 has a CVSS score of 8.8 and, when exploited, has the potential for privilege escalation, information disclosure, and a denial of service (DoS) condition. The Intel Reptar…
The Transition to CVSS v4.0 – What You Need to Know
The Forum of Incident Response and Security Teams (FIRST) has officially released version 4.0 of the Common Vulnerability Scoring System (CVSS). This new version comes four years after the release of CVSS v3.1. It marks a significant evolution in the…
Several Cobbler Vulnerabilities Fixed in Ubuntu 16.04
A series of Cobbler vulnerabilities have been addressed in Ubuntu 16.04 ESM in the recent security updates. Ubuntu 16.04 ESM (Expanded Security Maintenance) is the extended version of end-of-life Ubuntu 16.04 LTS with extra security patching beyond the end dates.…
Webinar: Best Practices for Security Compliance
Join our upcoming webinar with DevSecOps expert, Wilson Mar, and learn how to turn compliance into a strategic advantage for your organization. The post Webinar: Best Practices for Security Compliance appeared first on Security Boulevard. This article has been indexed…