Randall Munroe’s XKCD ‘Predicament’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Predicament’ appeared first on Security Boulevard.
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Predicament’ appeared first on Security Boulevard.
Self-service password reset (SSPR) and self-service account recovery (SSAR) are essential for reducing IT workload and empowering users. However, these solutions, if not implemented securely, can become an organization's biggest security hole. Up to 50% of all IT help desk tickets are for password resets, costing approximately $70 each. While SSPR and SSAR aim to solve this, traditional methods are often fundamentally broken, leaving organizations vulnerable to costly account takeovers.
The post Making Self-Service Password Reset and Account Recovery Secure appeared first on Security Boulevard.
Yes, our worst nightmares are probably about to happen. WIRED has just reported that “The Era of AI-Generated Ransomware Has Arrived.” What’s more, the U.S.-based artificial intelligence (AI) company Anthropic admitted that its technology has been weaponized by hackers to carry out sophisticated cyberattacks. Let’s face it. If you thought being breach-ready was something you […]
The post Catalog the Crown Jewels: First Step in Breach Readiness appeared first on ColorTokens.
The post Catalog the Crown Jewels: First Step in Breach Readiness appeared first on Security Boulevard.
Sep 05, 2025 - Lina Romero - In 2025, we are seeing an unprecedented rise in the volume and scale of AI attacks. Since AI is still a relatively new beast, developers and security teams alike are struggling to keep up with the changing landscape. The OWASP Top 10 Risks for LLMs is a great jumping-off point to gain insight into the biggest risks and how to mitigate them.Excessive AgencyAgency refers to a model’s ability to call functions, interface systems, and undertake actions. Developers grant each AI agent a necessary degree of agency depending on its use case. When an LLM malfunctions, an AI agent should respond appropriately according to the agency it’s been given. However, Excessive Agency occurs when an AI agent responds inappropriately, performing “damaging actions” in response to unusual LLM outputs. Excessive Agency is ultimately caused by design flaws, stemming from one of the following:Excessive functionality: an LLM has access to extensions which include functions not needed to perform its job, or it may still have access to plugins from the development phase that are no longer neededExcessive permissions: an LLM has permissions for downstream functionality and systems not originally intendedExcessive autonomy: an LLM performs actions that it has not been approved for.And the effects of Excessive Agency vulnerabilities can be catastrophic, leading to PII breaches, financial losses, and more. However, there are ways to mitigate and prevent Excessive Agency.Limit extensions: Only allow the LLM to interact with the minimum necessary amount of extensions.Know your agents: If you can’t see it, you can’t secure it! Keep a centralized inventory to track all agents and interactions.Limit extension functionality: Ensure that the functions implemented to an LLM’s extensions are strictly necessary for its intended purpose.Assess your agents: Test agents as a whole, including the sum of their application code.No open-ended extensions: Open-ended extensions with more granular functionality are not strictly necessary, and open the LLM up to more vulnerabilities than they are worth.Require human approval: For some high-impact actions, it may be necessary to have guardrails around them that require permission from an actual user.Assess application code: Assess for input and output handling to see where upstream and downstream vulnerabilities lay.Sanitize LLM inputs and outputs: Sanitization is a best practice for AI security in general, but particularly following OWASP’s recommendations around Application Security Verification Standards (ASVS) and focusing on input sanitization is critical.Documentation is king: We’ve said it before and we’ll say it again, log everything carefully and monitor those logs with detections.Complete mediation: Instead of relying on an LLM to decide if an action is allowed, implement authorizations in downstream systems and enforce the complete mediation principle so all requests must be validated before completion.Overall, Excessive Agency occurs when an LLM performs actions and behaves in ways outside of what it was created for. Therefore, it is a huge risk to AI security and needs to be mitigated by secure coding and developing practices such as implementing authorizations, sanitizing data, and more. To learn how FireTail can help you protect against Excessive Agency and the other risks outlined in the OWASP Top 10 for LLM, set up a demo or get started with our free tier, today.
The post LLM06: Excessive Agency – FireTail Blog appeared first on Security Boulevard.
Solution Providers Rank IRONSCALES as the Top Performer in Security - Email and Web
Today we’re excited to announce that IRONSCALES has earned a 2025 CRN Annual Report Card (ARC) Award in Security - Email and Webfrom CRN®, a brand of The Channel Company. The ARC Awards spotlight the technology vendors providing best-in-class products and solution provider partnership throughout the IT channel ecosystem.
The post IRONSCALES Honored with CRN 2025 Annual Report Card (ARC) Award appeared first on Security Boulevard.
On September 5, 2025, GitGuardian discovered GhostAction, a massive supply chain attack affecting 327 GitHub users across 817 repositories. Attackers injected malicious workflows that exfiltrated 3,325 secrets, including PyPI, npm, and DockerHub tokens via HTTP POST requests to a remote endpoint.
The post The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows appeared first on Security Boulevard.
Creator, Author and Presenter: David Spark, Andy Ellis, Alexandra Landegger
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: CISO Series Podcast – LIVE! appeared first on Security Boulevard.
Destructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical infrastructure networks. With this type of cyber threat in the spotlight, we’re rounding up recent cyber advice for securing critical infrastructure.
In case you missed it, here are six things to know right now about protecting everything from operational technology (OT) and industrial control systems (ICS) to the countless IoT devices that power our world.
1- Global alert: China-backed APTs hit critical infrastructure in cyber espionage campaignLet’s start with the most recent news. Last week, multiple U.S. and international government agencies warned critical infrastructure organizations about ongoing and global cyber attacks from advanced persistent threat (APT) attackers backed by the Chinese government (PRC).
The joint advisory – “Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System” – urged security teams to immediately take basic but essential steps, including patching known exploited vulnerabilities; adopting centralized logging; and securing network edge devices.
The prime target? The network infrastructure of large telecom providers, although other critical infrastructure sectors, such as the military and transportation, have also been hit.
The threat actors, active since 2021 and identified over the years as Salt Typhoon, Operator Panda, RedMike, UNC5807 and GhostEmperor, are walking through unlocked doors. For initial entry, they look for low-hanging fruit, such as vulnerabilities that have been disclosed and for which patches exist, including these:
Once inside, the attackers try to avoid detection so that they can stay hidden for years to gather intelligence. Their playbook includes:
Here’s a small sampling of the mitigation recommendations:
To get a deep dive into this threat, read this blog from Tenable's Research Special Operations team: "Frequently Asked Questions About Chinese State-Sponsored Actors Compromising Global Networks."
Meanwhile, the FBI last month alerted that a Russian government unit has been hijacking network devices to surveil industrial networks. In the alert “Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure,” the FBI warned that the hackers are targeting industrial control systems (ICS) by breaching networks via the years-old bug CVE-2018-0171 in the Cisco Smart Install (SMI) software.
For more information about Salt Typhoon and related China-backed APT attacks against critical infrastructure, check out these Tenable blogs:
Last month, the Cybersecurity and Infrastructure Security Agency (CISA) tackled the critical issue of visibility of OT wares with a new playbook for how to structure, manage and update an OT asset inventory.
The new guidance – titled “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators” – delivers a clear message: an OT asset inventory is the bedrock of any OT security architecture. Without it, OT security is fundamentally impaired.
“An OT asset inventory – an organized, regularly updated list of an organization’s OT systems, hardware, and software – is foundational to designing a modern defensible architecture,” the document reads.
But OT operators shouldn’t stop there.
They also must classify their assets. OT environments are a diverse mix of legacy systems, sensors and specialized devices – along with their usual variety of proprietary communication protocols. CISA recommends creating a taxonomy to understand each component's role.
Classifying OT assets by function and importance helps to:
Steps To Build An OT Asset Taxonomy
(Source: CISA)
The document, which CISA created in collaboration with multiple U.S. and international government agencies, aims to help critical infrastructure organizations shift from a reactive to a proactive security posture via full asset visibility and thus attain a more resilient and secure OT environment.
For more information about OT security, check out these Tenable resources:
From medical implants to industrial sensors, tiny Internet-of-things (IoT) devices are everywhere in critical infrastructure. The problem? Most of them don't have the processing muscle for heavy-duty encryption.
To fix this, the National Institute of Standards and Technology (NIST) just finalized a new standard for lightweight cryptography. It’s built for the billions of IoT devices with limited computational resources.
“We encourage the use of this new lightweight cryptography standard wherever resource constraints have hindered the adoption of cryptography,” NIST computer scientist Kerry McKay, who co-led the project, said in a statement.
(Credit: Image generated by Tenable using Google Gemini)
Detailed in NIST Special Publication 800-232, the standard is built around the Ascon family of cryptographic algorithms and includes four specific algorithms designed for different security needs.
This new standard is designed for straightforward implementation and offers better protection against "side-channel attacks," where adversaries analyze a device's power consumption or timing to glean information.
For more information about IoT security:
Of course, the first step in preventing OT breaches is selecting products that were designed and built securely.
In January, CISA published a guide to help organizations choose OT products with cybersecurity baked in from the start.
Titled “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products,” the publication highlights 12 cybersecurity elements that OT products should have, including:
According to CISA, many OT products aren’t designed and developed securely, so they ship with issues such as weak authentication, known vulnerabilities and insecure default settings.
In fact, the agency says it’s common for hackers to specifically target OT products they know are insecure, instead of going after specific organizations.
Back in September 2024, CISA sounded the alarm on critical infrastructure organizations’ susceptibility to common, well-known attack methods in its “CISA Analysis: Fiscal Year 2023 Risk and Vulnerability Assessments” report.
The report’s findings are based on risk and vulnerability assessments (RVAs) of the security of 143 critical infrastructure organizations that CISA and the U.S. Coast Guard conducted in 2023.
Specifically, CISA and USCG assessors had the most success gaining initial access, attaining network permanence, evading defenses and moving laterally by using valid accounts, phishing schemes and default credentials — all simple attack methods.
For example, the use of valid accounts, which are legitimate accounts whose login credentials have been compromised, was the most successful attack technique for achieving:
(Source: “CISA Analysis: Fiscal Year 2023 Risk and Vulnerability Assessments” report, September 2024)
The report offers troves of recommendations to critical infrastructure organizations, including:
For more information about protecting critical infrastructure environments and about operational technology (OT) security, check out these Tenable resources:
As OT computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.
That’s the key message the Cloud Security Alliance delivered in November via its “Zero Trust Guidance for Critical Infrastructure” white paper, which focuses on applying zero trust methods to OT and ICS systems.
While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper.
The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.
Among the topics covered are:
The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:
To get more details, read:
For more information about OT systems cybersecurity, check out these Tenable resources:
What's your plan when ransomware locks up your OT and industrial control systems? If you don't have one, the SANS Institute is here to help.
Its new framework, “A Simple Framework for OT Ransomware Preparation” provides a hands-on guide for building a response playbook. The key message? Preparation is everything.
With the document, published in April, SANS aims to outline an actionable, hands-on approach for critical infrastructure organizations seeking to build or fine-tune ransomware response playbooks.
“In the OT world, a lack of preparation can have real-world consequences,” reads a SANS blog titled “Building a Better OT Ransomware Response Plan: A Simple Framework for ICS Environments.”
At a high level, SANS recommendations for critical infrastructure organizations with OT / ICS environments include:
“By focusing on the unique challenges of OT networks, such as their architectural immaturity and the criticality of safe operations, the framework provides actionable guidance to enhance incident response capabilities,” the document reads.
The post Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure appeared first on Security Boulevard.
Enterprises today are no longer confined to a single IT environment. Instead, they are embracing multi-cloud strategies—leveraging services from AWS, Microsoft Azure, Google Cloud, and private clouds to achieve flexibility, scalability, and cost efficiency. This shift enables digital transformation at scale but also introduces unprecedented security challenges. With workloads distributed across multiple providers, visibility becomes
The post Multi-Cloud Security appeared first on Seceon Inc.
The post Multi-Cloud Security appeared first on Security Boulevard.
Cybersecurity today is more complex than ever before. Organizations operate in hybrid and multi-cloud environments, manage remote and mobile workforces, and depend on countless third-party applications and integrations. This interconnectedness drives innovation—but it also creates fragmented security silos that adversaries exploit. Most businesses still rely on multiple point solutions for monitoring endpoints, networks, cloud, and
The post Unified Security Visibility appeared first on Seceon Inc.
The post Unified Security Visibility appeared first on Security Boulevard.
Interesting experiment:
To design their experiment, the University of Pennsylvania researchers tested 2024’s GPT-4o-mini model on two requests that it should ideally refuse: calling the user a jerk and giving directions for how to synthesize lidocaine. The researchers created experimental prompts for both requests using each of seven different persuasion techniques (examples of which are included here):
The post GPT-4o-mini Falls for Psychological Manipulation appeared first on Security Boulevard.
Sevii launched an autonomous defense & remediation (ADR) platform, using agentic AI Warriors to cut response times and transform SOC operations.
The post Sevii Agentic AI Warriors Augment SOCs with Machine-Speed Remediation appeared first on Security Boulevard.
In recent weeks, major companies like Palo Alto Networks, Zscaler, Cloudflare, and SpyCloud have all confirmed they were affected by a string of cyberattacks that began with Salesforce. Or at least, that is how the headlines read. This is not a case of Salesforce being hacked. Nor is it a flaw in any single product. […]
The post Behind the Salesforce OAuth Drift Breach appeared first on Centraleyes.
The post Behind the Salesforce OAuth Drift Breach appeared first on Security Boulevard.
Find the best vulnerability management software for your enterprise. Evaluate key features, integration with SSO & CIAM, and top solutions to protect your systems.
The post Identifying the Best Vulnerability Management Software appeared first on Security Boulevard.
Most firms fall short on data resilience. Learn how to close the gaps & turn resilience into a growth advantage.
The post Data Resilience Reality Check: Why Most Organizations are Failing Their Own Audits appeared first on Security Boulevard.
Product Update: Version 5.1 This release is all about helping you move faster, see more, and manage your infrastructure with greater ease. From real-time polling and smarter layout tools to expanded support for DC power and new visual enhancements in rack views, this update is packed with practical improvements. Plus, with French ...
The post Accelerated Polling appeared first on Hyperview.
The post Accelerated Polling appeared first on Security Boulevard.
In response to the CISA Advisory (AA25-239A), AttackIQ has updated the assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the Chinese adversary Salt Typhoon and released a new attack graph emulating the behaviors exhibited during the SparrowDoor and ShadowPad campaign in March 2025.
The post Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System appeared first on AttackIQ.
The post Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System appeared first on Security Boulevard.
How Essential is Effective Secrets Management in Today’s Cybersecurity Landscape? The management of Non-Human Identities (NHIs) and their secrets has become an increasingly important consideration. It comes as no surprise that many organizations, including those in the financial services, healthcare, travel, DevOps, and SOC teams, are recognizing the profound impact of effective secrets management on […]
The post Empower Your Team with Better Secrets Management appeared first on Entro.
The post Empower Your Team with Better Secrets Management appeared first on Security Boulevard.
Why is NHI Management Crucial in Today’s Expanding Digital Landscape? Have you ever considered how the rise in online and interconnected industries could be putting your company’s systems at risk? Where rapid technological advancements continue to transform industries and businesses, it becomes ever more crucial to consider the security implications that come along with these […]
The post Innovations in Managing Non-Human Identities appeared first on Entro.
The post Innovations in Managing Non-Human Identities appeared first on Security Boulevard.
When flights get delayed, passengers want answers fast: rebooking, hotel vouchers, refund options. Human agents can’t scale to meet this surge, but AI agents can. The challenge? Identity.
The post Airline Disruption Recovery — How Agentic Identity Keeps Travel on Track appeared first on Strata.io.
The post Airline Disruption Recovery — How Agentic Identity Keeps Travel on Track appeared first on Security Boulevard.