Tag: Security Boulevard

Trend Micro Adds AI Tool While Extending CNAPP Reach

Trend Micro’s generative AI tool, Trend Companion, leverages natural language to reduce toil by bringing context to alerts and reducing incident investigation times. The post Trend Micro Adds AI Tool While Extending CNAPP Reach appeared first on Security Boulevard. This…

What Is The Cyber Kill Chain? Process & Model

Grasping the Fundamentals: A Study of the Cyber Harm Ladder Navigating the multifaceted universe of cybersecurity is similar to solving an evolving labyrinth. This world is awash with intricate principles and techniques; with the Cyber Harm Ladder gaining increasing focus…

Different Types of CISOs, Diverse Missions

There are a range of distinct roles/missions that hold the CISO title. Their ultimate goals are similar, but how they are positioned to do that varies. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard. This…

DarkCasino WinRAR Exploit: A New APT Threat Emerges

In a recent cybersecurity revelation, a formidable and highly sophisticated cyber threat has surfaced, going by the name DarkCasino. Initially perceived as a phishing campaign orchestrated by the EvilNum group, recent analyses by cybersecurity firm NSFOCUS have reclassified DarkCasino as…

Detecting AiTM Phishing Sites with Fuzzy Hashing

Background In this blog, we will cover how Obsidian detects phishing kits or Phishing-as-a-Service (PhaaS) websites for our customers by analyzing the fuzzy hashes of visited website content. This concept draws from prior industry art, as IOCs (ex: SHA-1/SHA-265) and…

N. Korean Threat Groups Mixing Tactics to Evade Detection

Researchers with Google-owned Mandiant last month wrote about increasing collaboration among North Korea-supported threat groups as one indication of a larger evolution of the regime’s offensive cyber program. The half-dozen or so state-sponsored cyberthreat groups associated with North Korea have…

5 Security Risks of Responsive Web Design

The very features that make responsive web design (RWD) so flexible can also introduce new security vulnerabilities if not properly managed. The post 5 Security Risks of Responsive Web Design appeared first on Security Boulevard. This article has been indexed…

Strata Identity’s Maverics Achieves SOC 2 Type II Certification

MEDIA ADVISORY Standard Validates that Maverics Identity Orchestration Meets the Highest Standards for Security, Availability, and Confidentiality  BOULDER, Colo., Nov.29, 2023 – Strata Identity, the Identity Orchestration company, today announced that the Maverics Identity Orchestration Platform™ received a System and…

Web Security 101 – Best Practices and Solutions

Web security is an umbrella term for internet security which includes website security – the practice of safequaring your website against attacks. The post Web Security 101 – Best Practices and Solutions appeared first on Security Boulevard. This article has…

Intel Reptar Flaw Patch For CPU Vulnerability Released

Intel recently released multiple fixes for a high-severity vulnerability dubbed Reptar. The CVE-2023-23583 has a CVSS score of 8.8 and, when exploited, has the potential for privilege escalation, information disclosure, and a denial of service (DoS) condition. The Intel Reptar…