Prestigious Global Awards Program Recognizes Innovative Security Products The post Kasada Wins “e-Commerce Security Solution of the Year” in 2025 CyberSecurity Breakthrough Awards appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
Category: Security Boulevard
USENIX 2025: PEPR ’25 – OneShield Privacy Guard: Deployable Privacy Solutions for LLMs
Creator, Author and Presenter: Shubhi Asthana, IBM Research Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – OneShield Privacy Guard: Deployable Privacy…
Rethinking DDoS Defense: Why Scale Isn’t the Only Metric That Matters
In recent months, headlines have drawn attention to record-breaking DDoS attacks, often measured in terabits per second (Tbps) and accompanied by declarations of network capacity in the hundreds of Tbps. These figures, while impressive, can create a misleading narrative about…
Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability
Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch is important, the discovery itself serves as a critical wake-up call for every organization rushing…
USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split…
CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit Enterprises Hard
A critical zero-day vulnerability in Oracle E-Business Suite (EBS) was exploited by the Cl0p ransomware group in mid-2025. The flaw, later tracked as CVE-2025-61882, allowed remote code execution without authentication,… The post CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit…
Visionary: 2025 Gartner® Magic Quadrant™ for Application Security Testing
We’re proud to share that Gartner has once again recognized Contrast Security as a Visionary in the 2025 Magic Quadrant for Application Security Testing (AST). The post Visionary: 2025 Gartner® Magic Quadrant™ for Application Security Testing appeared first on Security…
Terraform Secrets Management Best Practices: Secret Managers and Ephemeral Resources
👉 TL;DR: Use a secrets manager and variables—never hardcode secrets. Mark outputs sensitive and store state remotely with encryption and strict access. Traditional data sources can leak to state; use Terraform 1.10 ephemeral resources to fetch/generate secrets at apply time…
When Your SaaS Feels Human at Scale
Discover how AI-driven communication brings empathy and personality to SaaS, helping automation feel more human, personal, and emotionally intelligent. The post When Your SaaS Feels Human at Scale appeared first on Security Boulevard. This article has been indexed from Security…
Rethinking Security Data Management with AI-Native Pipelines
AI-native security data pipelines transform security operations by using machine learning for adaptive filtering, automation, and 90% lower overhead. The post Rethinking Security Data Management with AI-Native Pipelines appeared first on Security Boulevard. This article has been indexed from Security…
Exciting Developments in Cloud-Native Security
Are Machine Identities the Hidden Key to Cloud-Native Security? Effective cybersecurity strategies rely not only on safeguarding human credentials but also on ensuring the security of non-human identities (NHIs). These machine identities, often overshadowed by their human counterparts, play a…
Zero Trust for AI Agents: Implementing Dynamic Authorization in an Autonomous World
Traditional role-based access control assumes predictable behavior, but AI agents exhibit emergent behaviors no human anticipated. Dynamic authorization using ABAC and JWT tokens enables real-time policy decisions that adapt to AI behavior, environmental context, and risk levels automatically. The post…
Exposure Management Beyond The Endpoint
Relying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does. Key takeaways: Long remediation cycles and difficulty prioritizing risk are significant challenges for…
The First Malicious MCP Server is a Warning Shot for AI Cybersecurity
The first malicious Model Context Protocol (MCP) server has been discovered and we should all be worried how this is foreshadowing AI cybersecurity risks! Cybersecurity researchers at Koi Security detected malicious code within an MCP server that connects AI…
Modernizing Federal DevSecOps for CMMC and Beyond
The Cybersecurity Maturity Model Certification (CMMC) 2.0 marks a clear shift from box-checking to modernization. Compliance is, of course, important. However, this evolution highlights the need to revise our approach to how software is developed, governed, and delivered across federal…
We Raised $15M to Build the Future of Security Data
We’re excited to share that Realm Security has raised a $15M Series A, just 12 months after our $5M seed round. We wouldn’t be here without our customers, our team, and our partners. Thank you for believing in what we’re…
Salesforce Refuses to Pay Ransom to Data-Stealing Hackers
Salesforce is refusing a demand by the hackers behind that widespread data-stealing attacks on its customers, which threatened to release massive amounts of the data unless the SaaS vendor negotiated a ransom payment. In an email, Salesforce reportedly told customers…
Law Enforcement Pressure is Reshaping the Global Ransomware Threat Landscape
Check Point’s Q2 2025 Ransomware Report reveals the collapse of major RaaS groups like LockBit and RansomHub, giving rise to a new, fragmented wave of ransomware actors. The post Law Enforcement Pressure is Reshaping the Global Ransomware Threat Landscape appeared…
Roll your own bot detection: fingerprinting/JavaScript (part 1)
This is the first article in a two-part series where we show how to build your own anti-bot system to protect a login endpoint, without relying on third-party services. Why write this? Many bot detection solutions, reCAPTCHA, Turnstile, or vendor-maintained…
Reassuring Stakeholders with Solid Secrets Management
How Can Non-Human Identities Transform Secrets Management? Imagine where machine identities, much like human ones, silently pave the way for successful operations across diverse industries. How are these Non-Human Identities (NHIs) reshaping secrets management and stakeholder reassurance? NHIs are revolutionizing…