Category: Security Boulevard

How certain can you be of your AI-driven security

How Can Organizations Ensure AI-Driven Security Certainty? Are you confident in security your organization receives from AI-driven solutions? Ensuring the trustworthiness of AI-driven security mechanisms is vital. With machine identities, known as Non-Human Identities (NHIs), become more prevalent, the focus…

How safe are Non-Human Identities from cyber threats

Why Are Non-Human Identities Crucial in Combating Cyber Threats? Have you ever considered the importance of Non-Human Identities (NHIs)? Protecting these machine identities has become as critical as safeguarding human credentials, particularly with the rise of automation and cloud computing.…

NDSS 2025 – Siniel: Distributed Privacy-Preserving zkSNARK

Session 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer…

SANDWORM_MODE: The Rise of Adaptive Supply Chain Worms

Earlier this year, we asked our team where they expect open source cyberattacks to go next. Sonatype Principal Security Researcher Garrett Calpouzos shared his thoughts about how he anticipated attackers won’t simply use automation, but also abuse victims’ AI tools: The…

Randall Munroe’s XKCD ‘Proof Without Content’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Proof Without Content’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall…

Dust Specter APT Targets Government Officials in Iraq

IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. Due to significant overlap in tools, techniques, and procedures (TTPs), as well as victimology, between this…

Top Data Breaches of February 2026

February 2026 brought a series of significant data breaches spanning automotive, aviation, hospitality, finance, telecom, and media. The incidents were not driven by a single attack method. Some resulted from… The post Top Data Breaches of February 2026 appeared first…

Feb Recap: New AWS Privileged Permissions and Services

As February 2026 comes to a close, the focus of AWS permission expansion has moved from core infrastructure to the Generative AI supply chain. This month’s review of newly released permissions highlights a strategic pivot toward model customization and deep-tier…

Enterprise Passwordless Authentication for Retail Brands

Retailers face unique authentication challenges impacting revenue, fraud, and customer experience. Learn how passwordless authentication can improve security, reduce friction, and scale for omnichannel. The post Enterprise Passwordless Authentication for Retail Brands appeared first on Security Boulevard. This article has…

PCI-Compliant Authentication for Retail Enterprises

Retailers, fortify your defenses! Learn how PCI-compliant authentication protects customer data, prevents fraud, and avoids costly penalties. Click for expert strategies! The post PCI-Compliant Authentication for Retail Enterprises appeared first on Security Boulevard. This article has been indexed from Security…