Tag: Security Boulevard

Why Bad Bots Are the Digital Demons of the Internet

In the dimly lit corners of the internet, where shadows flicker and eerie silences prevail, there lurks entities of malevolent intent. They are not the stuff of old wives’ tales or campfire ghost stories. We’re talking about bad bots, the…

Cisco IOS XE CVE-2023-20198: Deep Dive and POC

Introduction This post is a follow up to https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/. Previously, we explored the patch for CVE-2023-20273 and CVE-2023-20198 affecting Cisco IOS XE and identified some likely vectors an attacker might […] The post Cisco IOS XE CVE-2023-20198: Deep Dive and…

What makes Web Applications Vulnerable?

Virtual programs are now an essential component of our daily lives. Web applications are now essential tools for both individuals and organizations. From online shopping to social media and banking, we depend on internet apps for convenience and accessibility. However,…

Simplify User Access with Federated Identity Management

Discover the power of federated identity management for seamless SSO and enhanced user access. Improve security and streamline authentication The post Simplify User Access with Federated Identity Management appeared first on Security Boulevard. This article has been indexed from Security…

What is a Cloud Workload Protection Platform ? (CWPP)

Diving into the Depths of Cloud Workload Defense Framework (CWDF) Mysteries Setting out to understand cloud security, one frequently encounters the term – Cloud Workload Defense Framework (CWDF). What exact role does CWDF play? Let’s decode this riddle. At its…

Lateral Movement: Abuse the Power of DCOM Excel Application

In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within the distributed component object model (DCOM) Excel application. This technique is built upon Matt Nelson’s initial research on “Lateral Movement using Excel.Application and DCOM”. What…

Accelerating FedRAMP ATOs: OMB Memo

The Office of Management and Budget (OMB) released a Draft Memorandum for Modernizing the Federal Risk and Authorization Management Program (FedRAMP) on Friday, Oct 27, 2023. FedRAMP was codified in 2022 when Congress passed the FedRAMP Authorization Act (“Act”).  The…

How to Get HITRUST Certified—and Why

What is the HITRUST Certification? In 2007, a group of healthcare organizations, technology companies, and government agencies—including the American Hospital Association, Blue Cross Blue Shield Association, the Centers for Medicare & Medicaid Services (CMS), McKesson Corporation, and Microsoft—got together to…

Identity Theft: The Silent Threat for Executives

Identity theft isn’t a new phenomenon, but its rise in the executive world can no longer be ignored. As a CISO, you understand the importance of safeguarding not only your organization’s data but also the personal information of your top-level…

8 Essential Windows Security Tips to Protect Your Computer

Windows operating systems and software are complex pieces of software with millions of lines of code. This means that there are many potential vulnerabilities, or flaws, that can be exploited by attackers. Attackers can use vulnerabilities to gain unauthorized access…

Achieving Zero-Standing Privileges with Okta and Apono

Organizations are twice as likely to get breached through compromised credentials than any other threat vector. Compromised credentials are when credentials, such as usernames and passwords, are exposed to unauthorized entities.  When lost, stolen or exposed, compromised credentials can give…

DEF CON 31 – Policy Panel: International Cyber Policy 101

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

SOC Automation Explained: 7 Real-World Examples

The Security Operations Center (SOC) serves as a hub for an organization’s cybersecurity efforts. It is tasked with the responsibility of defending against unauthorized activities in the digital landscape. A SOC specializes in activities including monitoring, detection, analysis, response, and…

Why Smart SOAR is the Best SOAR for Slack

Effective communication is a critical component in incident response, often making the difference between rapid resolution and prolonged impact. This article explores how the integration between Smart SOAR and Slack provides a focused set of automated tasks to improve communication…

Staying Ahead of Social Engineering Threats

With social engineering exploits on the rise, now is a good time to stay ahead of threats and attackers’ tricks, keep your personal and sensitive data safe and stop unlawful entry into your organization. Bad actors are always looking for…

IT, Security Leaders Play Catch-Up With Generative AI Threats

There’s a significant disparity between organizations’ concerns about generative AI risks and their effectiveness in addressing them. The post IT, Security Leaders Play Catch-Up With Generative AI Threats appeared first on Security Boulevard. This article has been indexed from Security…