Ghost Accounts, Entitlement Creep, and Unwanted Guests: How Access Governance Can Protect Your SystemsIf your organization uses an ERP or other digital business applications to store and manage data, you could be at risk from some pretty spooky threats. With…
Category: Security Boulevard
How to Defend Against a DDoS Attack: 2023 Guide to Outsmart Cybercriminals
Introduction DDoS attacks are surging, posing a real threat to businesses big and small. In this 2023 guide, you’ll learn how to defend against a DDoS attack effectively. We’ll delve into types, tactics, and tools that fortify your network security.…
The First Step In Product Development: It’s Not Development, It’s The Idea
Product development process is a complex thing that involves transforming an idea into a tangible product. The first and most crucial stage of this process…Read More The post The First Step In Product Development: It’s Not Development, It’s The Idea…
DEF CON 31 – Laurie Kirk’s ‘Runtime Riddles – Abusing Manipulation Points In The Android Source’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Beat the Bots to Defeat SMS Toll Fraud in Gaming
Fraudsters use bot traffic to scale up SMS toll fraud attacks, causing significant losses to gaming platforms. By using smart bot management solutions that accurately identify malicious bots and human fraud farms, gaming platforms can prevent these attacks and ensuing…
New “Complaint Stealer” Malware Escalates, Targeting Cryptocurrency Wallets & Hospitality Sector
By Cofense Intelligence A series of campaigns delivering the newly christened “Complaint Stealer” malware began in mid-October and escalated within the last 2 days. The Complaint Stealer malware is an Information Stealer that targets cryptocurrency wallets and programs as well…
The Role of IoT Vulnerabilities in Identity Theft: An Unseen Danger for High-Net-Worth Individuals (HNWI)
The Internet of Things (IoT) is transforming how we live and work. From smart homes to connected cars, IoT devices are embedding themselves into our daily lives. But as we embrace this new world of convenience, a hidden danger lurks…
BTS #15 – Reverse Engineering BMCs and Other Firmware – Vladyslav Babkin
Show Notes The post BTS #15 – Reverse Engineering BMCs and Other Firmware – Vladyslav Babkin appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post BTS #15 – Reverse Engineering BMCs and Other Firmware –…
Attack Surface Management: The Role it Plays in Cybersecurity
The post Attack Surface Management: The Role it Plays in Cybersecurity appeared first on AI Enabled Security Automation. The post Attack Surface Management: The Role it Plays in Cybersecurity appeared first on Security Boulevard. This article has been indexed from…
Threat Spotlight: Initial Access Brokers on Russian Hacking Forums
Russian Hacking Forum Trends Initial access brokers (IAB) are sophisticated, focused, and specialized threat actors that focus on finding and gaining access to corporate environments. Once they compromise these environments, they auction off or sell the access on dark web…
Google Enhances Play Protect to Defend Against Polymorphic Malware
Google is strengthening its Google Play Protect tool with new real-time scanning features that aim to deal with the growing challenge of malicious apps that use polymorphic malware to evade detection. The new capabilities enable Play Protect to scan in…
Use of QR Codes in Phishing Campaigns is on the Rise
QR codes are quickly becoming a favorite tool of bad actors looking to launch phishing attacks, with one cybersecurity vendor saying the strategy appeared in 22% of phishing campaigns it detected in the first weeks of October. The numbers collected…
Open Source DAST, Browser Security and EDR: Security Tools Anyone Can Afford
It’s worthwhile to familiarize yourself with open source alternatives to popular commercial cybersecurity offerings. The post Open Source DAST, Browser Security and EDR: Security Tools Anyone Can Afford appeared first on Security Boulevard. This article has been indexed from Security…
Cybersecurity Spending Slows as Investment Patterns Shift
There was a 65% drop in growth in cybersecurity spending during the 2022-23 budget cycle, according to an IANS report. The post Cybersecurity Spending Slows as Investment Patterns Shift appeared first on Security Boulevard. This article has been indexed from…
The Urgency for Robust Utility Cybersecurity
The need for improved utility cybersecurity has never been more critical The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As the arteries of our contemporary world, these critical…
Understanding the Difference Between Penetration Testing and Vulnerability Scanning
Our clients often ask, “What is the difference between vulnerability scanning and penetration testing?” It’s a question that deserves attention, not only because of its frequency but also due to its critical role in shaping an organization’s cybersecurity strategy. Understanding…
NSFOCUS AISecOps: Elevating Your Security Operations Efficacy and Mitigating Alert Fatigue
In the realm of security operations, enterprises often face challenges such as a high volume of alerts, an inability to pinpoint real threats, insufficient security knowledge, and a lack of operational staff. While the operational platforms of major security firms…
Cybersecurity Awareness Month: The Evolution of Ransomware
This Cybersecurity Awareness Month, join GuidePoint Security for A Voyage Beyond the Horizon, a speculative exploration of possible scenarios that […] The post Cybersecurity Awareness Month: The Evolution of Ransomware appeared first on Security Boulevard. This article has been indexed…
Spoofed Rocket Alert App Targets Israeli Android Users with Spyware
As violence and protests spread in the chaotic war between Israel and Hamas, evidence of the parallel battle going on in cyberspace continue to emerge. It started almost immediately after the initial bloody incursion by Hamas fighters into southern Israel…
Digital Identity Firms Being Bolstered by Investments
Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, and the fallout from the COVID-19 pandemic. “The…
Survey Surfaces High Levels of Burnout Among Cybersecurity Professionals
The majority of cybersecurity pros are experiencing some level of burnout, with more than half reporting they are likely to switch jobs next year. The post Survey Surfaces High Levels of Burnout Among Cybersecurity Professionals appeared first on Security Boulevard.…
The Cost of Magecart: More Than Just a Single Fine
Companies will typically spend anywhere from tens of thousands of dollars to several million in the aftermath of a Magecart attack. The post The Cost of Magecart: More Than Just a Single Fine appeared first on Security Boulevard. This article…
Digital Identification: The Cornerstone for Confidence Online
By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals. The post Digital Identification: The Cornerstone for Confidence Online appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges
A DigiCert survey found most organizations unprepared to address the security implications of post-quantum computing (PQC). The post DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…
Data Breach Response: Protecting Your Digital Life After an Incident
Discovering that a company with which you’ve shared your personal data has fallen victim to a cyber attack is a sobering experience. Unfortunately, in this era of relentless cyber threats, it’s becoming increasingly common. So, what can you do if…
DTEX and ServiceNow: A Powerful Integration for Maturing Insider Risk Capability
The rise and complexity of insider security incidents has seen insider risk emerge as one of the fastest growing areas of cybersecurity today. The recently released 2023 Ponemon Cost of Insider Risks Global Report by DTEX Systems found 77% of…
Six Algorithms for Defending Against the Novel “HTTP/2 Rapid Reset” DDoS Attack
A recently discovered HTTP/2 protocol-based Distributed-Denial-of-Service (DDoS) vulnerability has been identified by multiple cloud service providers. This vulnerability enables attackers to achieve an unprecedented record of 398 million requests per second. This vulnerability has been identified as CVE-2023-44487, potentially making…
AI: A Collaborative Tool in Writing, Not Just a Replacement
The goal is not ‘AI versus human.’ The focus is on ‘AI and human.’ AI can help us write better, write more, and write with a perceptive eye on the reader’s expectations. The post AI: A Collaborative Tool in Writing,…
The benefits of using the new Data Privacy Framework
After the Schrems II ruling by the Court of Justice of the European Union, legal cross-border transfers of personal data from the EU to the U.S. became a key issue for U.S. businesses. After years of negotiations with the EU,…
Survey Reveals Lack of Appreciation for Business Risks
A Veritas survey suggested the level of risk organizations face is not being correctly assessed by nearly half of respondents. The post Survey Reveals Lack of Appreciation for Business Risks appeared first on Security Boulevard. This article has been indexed…
CSC Report Highlights Cybersecurity Threats .AI Domains Pose
Almost half of of Forbes Global 2000 companies do not have control over their branded artificial intelligence (.AI) domain names. The post CSC Report Highlights Cybersecurity Threats .AI Domains Pose appeared first on Security Boulevard. This article has been indexed…
Randall Munroe’s XKCD ‘Inspiraling Roundabout’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD! Permalink The post Randall Munroe’s XKCD ‘Inspiraling Roundabout’ appeared first on
Digital Trust & Safety Roundup: Rising ATO, new product updates, and Sift recognition
Explore the newest ATO data from Sift’s Q3 Digital Trust & Safety Index, learn about Sift’s latest product integrations and upgrades, and read about the company’s recent awards and recognition. The post Digital Trust & Safety Roundup: Rising ATO, new…
CISA and FBI to Network Admins: Patch Atlassian Confluence Now
Federal security agencies are urging network administrators to immediately patch Atlassian Confluence servers to protect against a critical security flaw that is being exploited by cybercriminals. The Cybersecurity and Infrastructure Security Agency (CISA), FBI, and Multi-State Information Sharing and Analysis…
DEF CON 31 – James Kettle’s ‘Smashing The State Machine The True Potential Of Web Race Conditions’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
New ESG Research Report Outlines Best Practices for Effective Application Security Programs
Learn what the latest research says about why application security programs struggle and what you can do to strengthen your AppSec. The post New ESG Research Report Outlines Best Practices for Effective Application Security Programs appeared first on Mend. The…
Cisco Zero-Day: As Bad as it Gets — and No Fix 4 Weeks in
Keeping us in suspense—It doesn’t get worse than this: CVE-2023-20198 is CVSS=10. The post Cisco Zero-Day: As Bad as it Gets — and No Fix 4 Weeks in appeared first on Security Boulevard. This article has been indexed from Security…
EPA Withdraws Cybersecurity Requirements for Water Systems
The Environmental Protection Agency in March ordered states to begin assessing the cybersecurity of their public water systems, a part of the Biden Administration’s multi-pronged effort to shore up the protections around the country’s critical infrastructure operations. Seven months later,…
Taking Stock of Identity Solutions in the Age of AI
Security pros can use ITDR and DCI in conjunction to combat security threats in the age of AI. The post Taking Stock of Identity Solutions in the Age of AI appeared first on Security Boulevard. This article has been indexed…
JumpCloud Adds Passwordless Authentication to Open Directory Platform
JumpCloud Inc. today updated its Open Directory platform to include support for a passwordless login capability, dubbed JumpCloud Go. The post JumpCloud Adds Passwordless Authentication to Open Directory Platform appeared first on Security Boulevard. This article has been indexed from…
5 Ways to Ensure Your Enterprise Data Security Strategy is fit for Purpose
Why do enterprise data security strategies need to evolve to cope with a new range of threats? The post 5 Ways to Ensure Your Enterprise Data Security Strategy is fit for Purpose appeared first on Security Boulevard. This article has…
Top 10 Compliance Tips for Startups
As a startup trying to build your organization there’s a ton to do – Including security compliance regulations and industry standards. The post Top 10 Compliance Tips for Startups appeared first on Scytale. The post Top 10 Compliance Tips for…
Digital Personal Data Protection Act (DPDP ACT) 2023, India’s Privacy Law
DPDP Act aims to transform how businesses manage, use, and protect personal data. India as a nation has advanced significantly in the age of digitization. The protection of people’s rights and privacy has always been India’s top priority for “Digital…
HTTP/2 Rapid Reset Attack Vulnerability
Rapid Reset Attack vulnerability enables remote attackers to spike CPU usage, potentially causing DoS. Understand how to find & fix this flaw. The post HTTP/2 Rapid Reset Attack Vulnerability appeared first on Indusface. The post HTTP/2 Rapid Reset Attack Vulnerability…
NSFOCUS Launches CTEM Offerings to Mitigate Threat Exposure
NSFOCUS CTEM Offerings: A Comprehensive Solution to Enhance Your Security Posture Singapore – October 17, 2023 – NSFOCUS, a globally recognized leader in cybersecurity solutions, is pleased to announce a comprehensive suite of security offerings designed to enhance the Continuous…
Spooky Experiments: Building Your Own Security Research Lab
Conducting security experiments can be a thrilling journey that sometimes demands advanced tools like flash readers, and at other times, you might find yourself using tools you’d never expect, such as a humble paper plate. During this event, Paul Asadoorian…
Randall Munroe’s XKCD ‘Sign Combo’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD! The post Randall Munroe’s XKCD ‘Sign Combo’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s XKCD…
Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?
< div> Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness? 3 min read·Just now — Acquiring companies in the tech space is more about defining the future and less about solving the current threats or problems. Companies…
DEF CON 31 – Alan Meekins’ ‘Snoop On To Them, As They Snoop On To Us’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
RomCom Malware Group Targets EU Gender Equality Summit
A hacker group that continues to extend its reach from financially motivated attacks into cyber-espionage this summer targeted attendees of a gender equality conference with a pared-down version of the RomCom remote access trojan (RAT). Void Rabisu – also known…
Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah. The post Elon’s CSAM FAIL: Twitter Fined by Australian Govt. appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Elon’s…
Microsoft Launches an AI Bug Bounty Program
As Microsoft aggressively integrates AI into its broad portfolio of products and services, the IT giant now is looking for help to ensure they are free of vulnerabilities. The company this month unveiled a new bug bounty program that will…
Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys
There are many unknown unknowns associated with building a FIDO-based passkey solution versus adopting off-the-shelf solutions. The post Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Survey Sees Shift to Passwordless Authentication Accelerating
A survey of 1,005 IT decision-makers published today found 89% expected their organizations to use passwords for less than 25% of logins within five years. The post Survey Sees Shift to Passwordless Authentication Accelerating appeared first on Security Boulevard. This…
Coin Flips Are Biased
Experimental result: Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study we collected 350,757 coin flips to test the counterintuitive prediction from a physics model of…
GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity
Supply chain security grows more crucial daily as cybercriminals attempt to disrupt distribution and transportation. In response, industry professionals must automate their cybersecurity tools to stay ahead. Why so? The 2020 SolarWinds cybersecurity incident — which industry experts call the…
Safeguarding Your Business From Social Media Risks
Social media is the avenue to foster connections, nurture relationships, and amplify your brand’s voice across a global digital stage. Yet, like any powerful digital tool, it carries its risks. Don’t mistake this blog for a call to retreat into…
Educating the Next Cybersecurity Generation with Tib3rius
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation. What fuels his desire to empower the next…
DEF CON 31 – Marcelo Salvati’s (@byt3b133d3r) ‘SpamChannel – Spoofing Emails From 2M+ Domains & Virtually Becoming Satan’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Where Next for States on All Things IT and Security?
The 2023 NASCIO Annual Conference wrapped up this past week in Minneapolis. Here’s a quick roundup of what happened and what’s next for state IT and cybersecurity. The post Where Next for States on All Things IT and Security? appeared…
Unlock Threat Hunting with MITRE ATT&CK: A 2023 Guide You Can’t Miss
Introduction In today’s rapidly evolving cyber landscape, proactive threat hunting is no longer a luxury—it’s a necessity. Gone are the days when traditional security measures could fully protect your network. Now, you need to actively seek out potential threats before…
DEF CON 31 – Tamas Jos ‘Spooky Authentication At A Distance’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Unleashing Synergy: How Secureflo’s AI and ML-Powered Services Elevate Cybersecurity and DevOps
Unleashing Synergy: How Secureflo’s AI and ML-Powered Services Elevate Cybersecurity and DevOps Unleashing Synergy: How Secureflo’s AI and ML-Powered Services […] The post Unleashing Synergy: How Secureflo’s AI and ML-Powered Services Elevate Cybersecurity and DevOps appeared first on Cyber security…
How to Use MITRE ATT&CK in 2023: A Must-Read Guide
Introduction In 2023, cybersecurity remains a pressing concern for businesses big and small. At the heart of this ever-evolving landscape is the MITRE ATT&CK framework. Designed to arm IT professionals with actionable insights, this framework is more relevant than ever.…
DEF CON 31 – David Melendez, Gabriela Garcia ‘Spread Spectrum Techniques For Anti Drone Evasion’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
IAM Security for Zero Trust: Advanced Access Management and Control
Say goodbye to the network perimeter you know and love. Its days are numbered, and… The post IAM Security for Zero Trust: Advanced Access Management and Control appeared first on Entrust Blog. The post IAM Security for Zero Trust: Advanced…
NSA Releases EliteWolf GitHub Repository for Securing OT Environments
The National Security Agency released a code repository in GitHub to make it easier for critical infrastructure organizations and similar entities to better identify and detect potentially malicious activities in their operational technology (OT) environments. The agency announced this week…
Stalking: Fear of Apple AirTag ‘Explodes’ — Lawsuit Momentum Grows
This is why we can’t have nice things: 38 victims of Apple’s “negligence” named in amended class action. The post Stalking: Fear of Apple AirTag ‘Explodes’ — Lawsuit Momentum Grows appeared first on Security Boulevard. This article has been indexed…
SEC is Investing Progress Software in Wake of MOVEit Attacks
Progress Software is now adding an investigation by the U.S. Securities and Exchange Commission to its growing list of legal and financial headaches stemming from the massive hack of its MOVEit file transfer tool that has affected more than 2,500…
Managing a World-Class Security Program in a Recession
As signs of a global recession continue to pile up, many businesses are tightening their spending across the board. Though cybersecurity remains a critical concern for virtually every type of organization, even security leaders may need to watch their spending—while…
Meet Ekran System at the Luxembourg Internet Days
Ekran System announces its participation in the Luxembourg Internet Days. The event will take place in the Luxembourg Chamber of Commerce, November 7–8, 2023. The Luxembourg Internet Days will convene over a thousand IT, OT, and ICT professionals. This year’s…
FIM Beyond Breaches: Compliance and Trust
More than just breach mitigation – File integrity monitoring (FIM) is trust and compliance Every day, we see an ever-escalating array of cyber threats. As organizations race to safeguard their digital assets, the spotlight isn’t just on preventing breaches but…
Unlocking the Future of Application Security: Evolution from ASOC to ASPM
Application Security Orchestration and Correlation (ASOC) used to be positioned as a leading edge solution to safeguard an organization’s applications, providing a strategic framework that integrates various AppSec tools and processes to more comprehensively mitigate vulnerabilities and protect against evolving…
What IT Orgs Need to Know About the Growth of AI
Discover how the growth of AI impacts IT organizations — the GOOD (improved detections), the BAD (phishing, social engineering), & the UGLY (WormGPT, FraudGPT). The post What IT Orgs Need to Know About the Growth of AI first appeared on…
DEF CON 31 – David Leadbeater’s ‘Terminally Owned – 60 Years Of Escaping’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Why The US Government Continues to Push for Software Supply Chain Security
What goals arose from the OpenSFF summit and what do they tell us about the US government’s stance on software supply chain security? The post Why The US Government Continues to Push for Software Supply Chain Security appeared first on…
How manufacturing best practices can improve open source consumption and software supply chains
The biggest problem facing software organizations today is an inability to track, monitor, and improve the usage of open source software. This isn’t about security alone. From DevOps to DevSecOps, there are fundamental principles that the best development teams use…
Arkose Accelerate AI + Cybersecurity: Event Recap and On-Demand Encore
In a world where the lines between reality and technology are becoming increasingly blurred, it’s crucial to stay at the forefront of the ever-evolving landscape of security and bot management. Our recent virtual and in-person event, Arkose Accelerate AI +…
Hackers Still Abusing LinkedIn Smart Links in Phishing Attacks
Email security firm Cofense in 2022 uncovered a phishing campaign that abused LinkedIn’s Smart Links feature to redirect unsuspecting victims to malicious websites, another example of bad actors using a trusted source to bypass security measures and reach users. At…
Insights from CISA’s Study on CDR
Author: Eric Avigdor, VP of Product Management, Votiro Malware transmitted via email has been a persistent plague to organizations for decades. Every organization has email, and sending emails with toxic payloads requires little infrastructure or effort, making it an attracti…
Microsoft Defender Brings Automated Attack Disruption to Endpoints
Microsoft’s Defender for Endpoint can now stop ransomware and other human-operated cyberattacks by automatically isolating a compromised device to keep the bad actors from being able to move laterally through a targeted organization’s network. The tool, which is on by…
Top 10 open source projects hit by HTTP/2 ‘Rapid Reset’ zero-day
Executive summary In this blog post we list at least 10 open source packages affected by the HTTP/2 ‘Rapid Reset’ vulnerability, disclosed by Cloudflare this week. The post Top 10 open source projects hit by HTTP/2 ‘Rapid Reset’ zero-day appeared…
Why Some Organizations Become Victims of Repeat Ransomware Attacks
It’s not a matter of if, but when an organization falls victim to a cyberattack. Despite increased awareness of ransomware’s risks and despite organizations’ efforts to increase security measures, attackers seem to always stay one step ahead. New research shows…
CISO Global Listed on PCI Marketplace as Qualified Security Assessor
Global cybersecurity provider working with clients to ready them for transition to upcoming PCI 4.0 standard Scottsdale, Ariz. October 11, 2023 – CISO Global (NASDAQ: CISO), an industry leader as a managed cybersecurity and compliance provider, has been added to…
PwC Survey: Boards of Directors Still Challenged by Cybersecurity
A survey of 645 boards of directors conducted by PwC found nearly half (49%) still viewed cybersecurity as a challenge. The post PwC Survey: Boards of Directors Still Challenged by Cybersecurity appeared first on Security Boulevard. This article has been…
Brand Impersonation Attacks: Which Industries are Most at Risk?
In late 2022, American Express was at the center of a brand impersonation attack. The attackers impersonated this well-known financial services brand to attempt to steal confidential information from victims at a nonprofit organization. The brand impersonation attack started with…
Approov Publishes Carnegie-Mellon University CyLab-Africa Report on Mobile App Security in Africa
This is a Guest Blog written by the CyLab-Africa team : Theoneste Byagutangaza, Lena Chacha, Trevor Henry Chiboora, Joel Jefferson Musiime and George McGregor from Approov. This week, we published a new report: “The Security Challenges of Financial Mobile Apps…
Cybersecurity Awareness Month: The Dark Side of Centralized Personal Identification Data
Guest Blogger: Branden Williams | VP, IAM Strategy | Ping Identity This Cybersecurity Awareness Month, join GuidePoint Security for A […] The post Cybersecurity Awareness Month: The Dark Side of Centralized Personal Identification Data appeared first on Security Boulevard. This…
The Difference Between “Secure” and “Safe” Is Bigger Than You Might Think
Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to…
Making Sense of the 2023 Ransomware Landscape
Understanding the current ransomware landscape is the first step to helping defenders protect their organizations. The post Making Sense of the 2023 Ransomware Landscape appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…
Your Codebase is a Cluttered Garage Full of Dead Code
Over time unused code becomes clutter as teams refactor. Shouldn’t Java developers have an easier way to identify dead code for removal? The post Your Codebase is a Cluttered Garage Full of Dead Code appeared first on Azul | Better…
SCR File Execution Using Rundll32 – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about the execution……
CVE-2023-38545 Curl Vulnerability Details Finally Released
On October 5, 2023, we released a blog post discussing the Curl Vulnerability, the critical security issue in Curl and libcurl version 8.4.0, known as CVE-2023-38545. In addition, there was another low-severity vulnerability, CVE-2023-38546. These vulnerabilities were scheduled to be…
Connected Intelligence: A New Approach to Managing Risk and Enabling Decision-Makers
Ensuring the safety of people and organizations is dynamic, asymmetric, and complex. A sense of permacrisis has driven a need for those tasked with managing risks to constantly perceive imperatives amongst the unyielding view of threat, risk, and problematic issues.…
Randall Munroe’s XKCD ‘Language Acquisition’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD! Permalink The post Randall Munroe’s XKCD ‘Language Acquisition’ appeared first on
High-Stakes Identity Impersonation: Lessons From the MGM Attack
MGM Resorts recently found itself in the midst of a major cybersecurity incident that not only crippled its operations but also exposed sensitive customer data. The sophisticated attack orchestrated by a group known as Scattered Spider employed social engineering to…
The Vital Role of User Experience In SaaS Cybersecurity Applications
In the realm of cybersecurity, the battle between hackers and defenders rages on. As we armor ourselves with cutting-edge SAAS applications to safeguard our digital realms, there’s one often overlooked element that can be the make or break factor –…
Powering ServiceNow Vulnerability Response with Complete and Accurate Data for All Devices
Overview Enterprises are a complex mix of devices, applications, and data, and the speed at which they are changing is growing exponentially. Look just about anywhere in the modern technology estate and you’re bound to find connected devices that either…
GNOME Libcue Flaw is a Risk to Linux Systems
Security researchers say a flaw in a relatively obscure component of the popular GNOME desktop environment for Linux could allow bad actors to gain control of the system if exploited. The remote code execution (RCE) vulnerability is in libcue, a…
Resurgence of LinkedIn Smart Links Identified in Sizable Credential Phishing Campaign
By: Nathaniel Raymond In 2022, the Cofense Phishing Defense Center (PDC) detected phishing campaigns that used LinkedIn links called Smart Links or “slink” to bypass security email gateway or SEG to deliver credential phishing, which was covered previously in the smart…