Category: Security Boulevard

Ghost Accounts, Entitlement Creep and Unwanted Guests

Ghost Accounts, Entitlement Creep, and Unwanted Guests: How Access Governance Can Protect Your SystemsIf your organization uses an ERP or other digital business applications to store and manage data, you could be at risk from some pretty spooky threats. With…

Beat the Bots to Defeat SMS Toll Fraud in Gaming

Fraudsters use bot traffic to scale up SMS toll fraud attacks, causing significant losses to gaming platforms. By using smart bot management solutions that accurately identify malicious bots and human fraud farms, gaming platforms can prevent these attacks and ensuing…

Use of QR Codes in Phishing Campaigns is on the Rise

QR codes are quickly becoming a favorite tool of bad actors looking to launch phishing attacks, with one cybersecurity vendor saying the strategy appeared in 22% of phishing campaigns it detected in the first weeks of October. The numbers collected…

Cybersecurity Spending Slows as Investment Patterns Shift

There was a 65% drop in growth in cybersecurity spending during the 2022-23 budget cycle, according to an IANS report. The post Cybersecurity Spending Slows as Investment Patterns Shift appeared first on Security Boulevard. This article has been indexed from…

The Urgency for Robust Utility Cybersecurity

The need for improved utility cybersecurity has never been more  critical   The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As the arteries of our contemporary world, these critical…

Cybersecurity Awareness Month: The Evolution of Ransomware

This Cybersecurity Awareness Month, join GuidePoint Security for A Voyage Beyond the Horizon, a speculative exploration of possible scenarios that […] The post Cybersecurity Awareness Month: The Evolution of Ransomware appeared first on Security Boulevard. This article has been indexed…

Digital Identity Firms Being Bolstered by Investments

Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, and the fallout from the COVID-19 pandemic. “The…

The Cost of Magecart: More Than Just a Single Fine

Companies will typically spend anywhere from tens of thousands of dollars to several million in the aftermath of a Magecart attack. The post The Cost of Magecart: More Than Just a Single Fine appeared first on Security Boulevard. This article…

Digital Identification: The Cornerstone for Confidence Online

By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals. The post Digital Identification: The Cornerstone for Confidence Online appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…

DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges

A DigiCert survey found most organizations unprepared to address the security implications of post-quantum computing (PQC). The post DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Survey Reveals Lack of Appreciation for Business Risks

A Veritas survey suggested the level of risk organizations face is not being correctly assessed by nearly half of respondents. The post Survey Reveals Lack of Appreciation for Business Risks appeared first on Security Boulevard. This article has been indexed…

CISA and FBI to Network Admins: Patch Atlassian Confluence Now

Federal security agencies are urging network administrators to immediately patch Atlassian Confluence servers to protect against a critical security flaw that is being exploited by cybercriminals. The Cybersecurity and Infrastructure Security Agency (CISA), FBI, and Multi-State Information Sharing and Analysis…

EPA Withdraws Cybersecurity Requirements for Water Systems

The Environmental Protection Agency in March ordered states to begin assessing the cybersecurity of their public water systems, a part of the Biden Administration’s multi-pronged effort to shore up the protections around the country’s critical infrastructure operations. Seven months later,…

Top 10 Compliance Tips for Startups

As a startup trying to build your organization there’s a ton to do – Including security compliance regulations and industry standards. The post Top 10 Compliance Tips for Startups appeared first on Scytale. The post Top 10 Compliance Tips for…

HTTP/2 Rapid Reset Attack Vulnerability

Rapid Reset Attack vulnerability enables remote attackers to spike CPU usage, potentially causing DoS. Understand how to find & fix this flaw. The post HTTP/2 Rapid Reset Attack Vulnerability appeared first on Indusface. The post HTTP/2 Rapid Reset Attack Vulnerability…

NSFOCUS Launches CTEM Offerings to Mitigate Threat Exposure

NSFOCUS CTEM Offerings: A Comprehensive Solution to Enhance Your Security Posture Singapore – October 17, 2023 – NSFOCUS, a globally recognized leader in cybersecurity solutions, is pleased to announce a comprehensive suite of security offerings designed to enhance the Continuous…

Randall Munroe’s XKCD ‘Sign Combo’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD! The post Randall Munroe’s XKCD ‘Sign Combo’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s XKCD…

RomCom Malware Group Targets EU Gender Equality Summit

A hacker group that continues to extend its reach from financially motivated attacks into cyber-espionage this summer targeted attendees of a gender equality conference with a pared-down version of the RomCom remote access trojan (RAT). Void Rabisu – also known…

Elon’s CSAM FAIL: Twitter Fined by Australian Govt.

Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah. The post Elon’s CSAM FAIL: Twitter Fined by Australian Govt. appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Elon’s…

Microsoft Launches an AI Bug Bounty Program

As Microsoft aggressively integrates AI into its broad portfolio of products and services, the IT giant now is looking for help to ensure they are free of vulnerabilities. The company this month unveiled a new bug bounty program that will…

Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys

There are many unknown unknowns associated with building a FIDO-based passkey solution versus adopting off-the-shelf solutions. The post Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Coin Flips Are Biased

Experimental result: Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study we collected 350,757 coin flips to test the counterintuitive prediction from a physics model of…

Safeguarding Your Business From Social Media Risks

Social media is the avenue to foster connections, nurture relationships, and amplify your brand’s voice across a global digital stage. Yet, like any powerful digital tool, it carries its risks. Don’t mistake this blog for a call to retreat into…

Educating the Next Cybersecurity Generation with Tib3rius

In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation. What fuels his desire to empower the next…

Where Next for States on All Things IT and Security?

The 2023 NASCIO Annual Conference wrapped up this past week in Minneapolis. Here’s a quick roundup of what happened and what’s next for state IT and cybersecurity. The post Where Next for States on All Things IT and Security? appeared…

How to Use MITRE ATT&CK in 2023: A Must-Read Guide

Introduction In 2023, cybersecurity remains a pressing concern for businesses big and small. At the heart of this ever-evolving landscape is the MITRE ATT&CK framework. Designed to arm IT professionals with actionable insights, this framework is more relevant than ever.…

Managing a World-Class Security Program in a Recession

As signs of a global recession continue to pile up, many businesses are tightening their spending across the board. Though cybersecurity remains a critical concern for virtually every type of organization, even security leaders may need to watch their spending—while…

Meet Ekran System at the Luxembourg Internet Days

Ekran System announces its participation in the Luxembourg Internet Days. The event will take place in the Luxembourg Chamber of Commerce, November 7–8, 2023. The Luxembourg Internet Days will convene over a thousand IT, OT, and ICT professionals. This year’s…

FIM Beyond Breaches: Compliance and Trust

More than just breach mitigation – File integrity monitoring (FIM) is trust and compliance  Every day, we see an ever-escalating array of cyber threats. As organizations race to safeguard their digital assets, the spotlight isn’t just on preventing breaches but…

What IT Orgs Need to Know About the Growth of AI

Discover how the growth of AI impacts IT organizations — the GOOD (improved detections), the BAD (phishing, social engineering), & the UGLY (WormGPT, FraudGPT). The post What IT Orgs Need to Know About the Growth of AI first appeared on…

Insights from CISA’s Study on CDR

Author: Eric Avigdor, VP of Product Management, Votiro Malware transmitted via email has been a persistent plague to organizations for decades. Every organization has email, and sending emails with toxic payloads requires little infrastructure or effort, making it an attracti…

Brand Impersonation Attacks: Which Industries are Most at Risk?

In late 2022, American Express was at the center of a brand impersonation attack. The attackers impersonated this well-known financial services brand to attempt to steal confidential information from victims at a nonprofit organization. The brand impersonation attack started with…

Making Sense of the 2023 Ransomware Landscape

Understanding the current ransomware landscape is the first step to helping defenders protect their organizations. The post Making Sense of the 2023 Ransomware Landscape appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

SCR File Execution Using Rundll32 – Security Spotlight

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks.  In this Security Spotlight, we’ll be talking about the execution……

CVE-2023-38545 Curl Vulnerability Details Finally Released

On October 5, 2023, we released a blog post discussing the Curl Vulnerability, the critical security issue in Curl and libcurl version 8.4.0, known as CVE-2023-38545. In addition, there was another low-severity vulnerability, CVE-2023-38546. These vulnerabilities were scheduled to be…

GNOME Libcue Flaw is a Risk to Linux Systems

Security researchers say a flaw in a relatively obscure component of the popular GNOME desktop environment for Linux could allow bad actors to gain control of the system if exploited. The remote code execution (RCE) vulnerability is in libcue, a…