LEESBURG, Va. – December 13, 2023 – Cofense, the leading provider of email security awareness training (SAT) and advanced phishing detection and response (PDR) solutions, today announced a first-of-its-kind, fully managed and customizable vishing security solution. This new Cofense solution…
Tag: Security Boulevard
Attack Surface Management: What is it? Why do you need it?
Traditional asset inventory and vulnerability management software can’t keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates… The post Attack Surface Management: What is it? Why do…
A Critical Remote Code Execution(RCE) Vulnerability in Apache Struts2 Flaw Puts Your Web Apps at Risk
The web development world is constantly on guard against security threats, and a recent discovery in the popular Apache Struts2 framework serves as a stark reminder. This critical vulnerability, known… The post A Critical Remote Code Execution(RCE) Vulnerability in Apache…
Top CISOs to Follow in 2024: Germany Edition
Here are just some of the top CISOs in Germany going into 2024 and some of their insights and experiences we can learn from. The post Top CISOs to Follow in 2024: Germany Edition appeared first on Scytale. The post…
Python 2 EOL: Coping with Legacy System Challenges
Python 2 was officially maintained and supported until January 1, 2020. The system becomes highly vulnerable without Python 2 security updates. TuxCare’s ELS for Python provides security fixes for Python 2.7 versions. Python 2.7 was the last…
How CSRD and EED are Reshaping Data Center Sustainability Reporting
With greater scrutiny of environmental impacts and a burgeoning consciousness about the social responsibility of data center operators, European regulations are undergoing significant transformations. The advent of the Corporate Sustainability Reporting Directive (CSRD) and the Energy Efficiency Directive (EED) are…
Snyk Launches ASPM Platform to Secure Software Supply Chains
Snyk’s ASPM platform promises to bridge the divide between cybersecurity teams and application developers. The post Snyk Launches ASPM Platform to Secure Software Supply Chains appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
DEF CON 31 – David Pekoske’s, Sean Lyngaas’, Jen Easterly’s ‘All Information Looks Like Noise Until You Break The Code’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling
In the ever-evolving landscape of software development, it’s become absolutely paramount to ensure robust security measures throughout the Software Development Lifecycle (SDLC). Need proof? In the last three years alone, we’ve witnessed a surge of high-profile supply chain attacks including…
CISA Unveils Tools to Strengthen Google Cloud Services
As organizations continue their migration to the cloud, threat groups are not far behind. According to a report earlier this year from cybersecurity firm CrowdStrike, the number of attacks against cloud environments in 2022 jumped 95% year-over-year, and those involved…
Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues
A new hope: Beeper’s reverse engineered iMessage integration, once killed by Tim’s crew, rises phœnix like. The post Apple Bops Beeper, but iMessage Android Whac-A-Mole Ensues appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
Lazarus Group Exploits Log4j Flaw in New Malware Campaign
The notorious North Korea-backed Lazarus Group continues to change up its tactics to evade detection, with a new campaign featuring the exploitation of the Log4j critical vulnerability and three new malware families written in the D – or DLang –…
Why Biden’s EO on AI Conflates the Role of Red-Teaming
The AI executive order’s broad language, particularly the role of red-teaming, prompts doubts about its practical implementation and effectiveness. The post Why Biden’s EO on AI Conflates the Role of Red-Teaming appeared first on Security Boulevard. This article has been…
Why Automation and Consolidation are Key to Restoring Confidence in Cybersecurity
The majority of of cybersecurity professionals feel the shortage of security resources negatively impacts their ability to effectively manage security posture. The post Why Automation and Consolidation are Key to Restoring Confidence in Cybersecurity appeared first on Security Boulevard. This…
Reco Employs Graph and AI Technologies to Secure SaaS Apps
Reco launched a platform that uses machine learning algorithms and graph technology to secure software-as-a-service (SaaS) applications. The post Reco Employs Graph and AI Technologies to Secure SaaS Apps appeared first on Security Boulevard. This article has been indexed from…
MFA and supply chain security: It’s no magic bullet
With attackers increasingly targeting developer accounts and using them to poison software builds, manipulate code, and access secrets and data, development teams are under pressure to lock down their development environments. The post MFA and supply chain security: It’s no…
Lazarus Cryptocurrency Hacks Estimated To Be $3 Billion
Threat actors from North Korea have been increasingly targeting the cryptocurrency sector since 2017 as a source of generating revenue. Reports have claimed that the country’s ruling elite and computer science professionals have access to new information and technology, equipping…
The Top 10, Top 10 Predictions for 2024
Don’t settle for just ten top cybersecurity predictions, when you can take a quick stroll through ten of the top lists. Catch Peter Silva’s annual post, here on the Ericom blog. The post The Top 10, Top 10 Predictions for…
Understanding SBOMs
In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what’s built. Its popularity among companies globally stems from cost savings and accelerated product time-to-market. However, there is a crucial aspect to…
LogoFAIL Attack: A Deep Dive into UEFI Vulnerabilities
A new threat has emerged, sending shockwaves through the cybersecurity industry – the LogoFAIL attack. This vulnerability targets the image-parsing components within the UEFI code, affecting a multitude of devices and posing a serious risk to the booting process. LogoFAIL…