Our Latest Product Updates
We’re constantly improving our product for our customers. See the latest features, improvements, and fixes we have shipped over the past month.
The post Our Latest Product Updates appeared first on Security Boulevard.
We’re constantly improving our product for our customers. See the latest features, improvements, and fixes we have shipped over the past month.
The post Our Latest Product Updates appeared first on Security Boulevard.
December 2023: The Initial Disruption Last December, insights from the Arkose Cyber Threat Intelligence Research (ACTIR) unit partnered with the Microsoft Digital Crimes Unit to disrupt the notorious cybercrime group, Storm-1152. A U.S. court authorized the seizure of Storm-1152 websites, aiming to disrupt their infrastructure, seize domain names, and hold the bad actors accountable. One […]
The post Storm-1152: A Continuing Battle Against Cybercrime appeared first on Security Boulevard.
Several high-severity vulnerabilities have been discovered in BIND, potentially exposing millions of DNS servers to denial-of-service attacks. These issues have prompted urgent security updates from major Linux distributions such as Ubuntu and Debian. In this article, we explore the details of these vulnerabilities, their potential impact, and provide guidance on how to protect your Linux […]
The post BIND Vulnerabilities: Urgent Security Updates Released appeared first on TuxCare.
The post BIND Vulnerabilities: Urgent Security Updates Released appeared first on Security Boulevard.
The Australian Cyber Security Centre (ACSC) has developed the Essential Eight, a set of baseline mitigation strategies designed to protect organizations against a wide range of
The post Enhancing Enterprise Security with the Essential Eight and StorageGuard appeared first on Continuity™.
The post Enhancing Enterprise Security with the Essential Eight and StorageGuard appeared first on Security Boulevard.
In today’s digital age, cybersecurity is a central pillar of Governance, Risk, and Compliance (GRC). But why is this so crucial, and why is there a burgeoning market for specialized cyber risk management tools and platforms? John Chambers, former CEO of Cisco, famously said, “There are two types of companies: those that have been hacked, […]
The post 7 Best Cyber Risk Management Platforms of 2024 appeared first on Centraleyes.
The post 7 Best Cyber Risk Management Platforms of 2024 appeared first on Security Boulevard.
Advancements in cloud computing have made securing data more complicated. Fortifying servers in data centers to protect sensitive information no longer provides adequate protection. The cloud has become the data repository for everything, and data security must keep pace.
The post Cloud Data Storage Raises New Security Issues appeared first on Security Boulevard.
RAD Security this week at the Black Hat USA 2024 conference revealed it has added artificial intelligence (AI) capabilities to its cloud detection and response (CDR) platform as part of an ongoing effort to reduce dependencies on signatures that need to be developed before threats can be detected.
The post RAD Security Combines AI With Behavioral Analytics to Improve Cybersecurity appeared first on Security Boulevard.
Overview Leveraging NSFOCUS’s Global Threat Hunting System, NSFOCUS Security Labs (NSL) captured an attack campaign targeting Azerbaijan and Israel on July 1, 2024. By analyzing the tactics, attack vectors, weapons, and infrastructure of the attack in this incident, it was found that the exposed attack characteristics have no direct connection with known APT groups. Therefore, […]
The post New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel appeared first on Security Boulevard.
The post Olympic scams: Be aware this summer appeared first on Click Armor.
The post Olympic scams: Be aware this summer appeared first on Security Boulevard.
LAS VEGAS — The U.S. presidential election is less than three months away, and many cybersecurity experts are bracing for a deluge of deceit. During a Black Hat 2024 keynote panel Wednesday morning, international leaders outlined how they are approaching election security risks — namely, cyber threats, nation-states, and the rapid spread of misinformation thought..
The post Democracy’s Challenge: Secure Elections Worldwide appeared first on Security Boulevard.
Authors/Presenters:Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – Eos: Efficient Private Delegation of zkSNARK Provers appeared first on Security Boulevard.
D3's Legacy SOAR Migration Program enables organizations to move from underperforming SOAR tools to D3’s Smart SOAR in record time.
The post D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR appeared first on D3 Security.
The post D3 Introduces Program to Help SOC Teams Migrate Successfully from Legacy SOAR appeared first on Security Boulevard.
Reading Time: 2 min Discover how Quinset Consulting leveraged PowerDMARC to transform their business and client relationships.
The post MSP Case Study: CloudIntellect Helped Clients Gain Granular Visibility on Email Channels with PowerDMARC appeared first on Security Boulevard.
Hackers ate my homework: MDM software for schools is breached for second time this year—13,000 devices wiped in Singapore alone.
The post Student Devices Wiped — Mobile Guardian Hacked AGAIN appeared first on Security Boulevard.
A SafeBreach researcher took over the Windows Update process to make the term “fully patched” meaningless on any Windows machine in the world.
The post Windows Downdate: Downgrade Attacks Using Windows Updates appeared first on SafeBreach.
The post Windows Downdate: Downgrade Attacks Using Windows Updates appeared first on Security Boulevard.
via the comic & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Matter’ appeared first on Security Boulevard.
Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabilities in an IT environment that should be remediated first based on the actual threat they represent.
The post Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level appeared first on Security Boulevard.
Protective DNS is one of the most effective strategies in modern cybersecurity. The National Security Agency (NSA) recently named it as one of the best defenses against evolving phishing attacks. As cyber threats become more sophisticated, organizations find an increasingly pressing need for advanced, proactive solutions.
While DNS filtering has existed for decades, legacy systems rely on static blocklists that bad actors can circumvent simply by switching domains. A protective DNS (PDNS) solution, however, uses advanced algorithms and data analytics to pinpoint a threat before it becomes damaging. Protective DNS from HYAS takes a proactive approach by identifying and blocking malicious activity dynamically.
Read on to see what makes HYAS Protect protective DNS a standout security solution and trusted tool of governments worldwide.
What Is HYAS Protect?HYAS Protect is a machine-learning-powered threat intelligence tool that uses advanced telemetry and authoritative domain based intelligence to proactively block malicious infrastructure. Put another way, it detects network breaches before they cause damage.
Like all PDNS systems, HYAS Protect blocks requests to potentially harmful domains, but it doesn’t require a predetermined list of domain names. Built on the advanced threat intelligence platform HYAS Insight, HYAS Protect uses aggregated data from leading cybersecurity sources around the globe and real-time, dynamic analysis to identify a threat days, weeks or even months before it is activated.
If a particular DNS request is potentially harmful, the HYAS Protect system blocks the query. To identify these threats, HYAS Protect runs a pattern analysis across IP addresses, name servers, registrars, and other factors to determine how closely a potentially harmful domain aligns known adversarial infrastructure — even if that domain has never before appeared in a cyberattack.
The HYAS solution doesn't care if a suspicious domain is on a list or if it's been seen yet. We know that based on specific telemetry, even if it hasn't been used or weaponized, it most likely will in the future.
How Does HYAS Protect Work?No matter how a network breach occurs—whether through ransomware, phishing, or another cyberattack—the malicious software needs to “beacon out” to the attack’s infrastructure, also known as command-and-control (C2). HYAS Protect detects this C2 beacon and terminates the connection before the attack can continue. For security-minded organizations, HYAS brings three core advantages.
1. Predictive Threat DetectionFirstly, the domain filtering in HYAS Protect is based on predictive data, leveraging advanced analytics to identify and block potentially malicious DNS requests before they can cause harm. This predictive approach uses a variety of data points and threat intelligence to assess the risk associated with each DNS query. If a request appears unusual or aligns with patterns often seen in cyberattacks, it is proactively blocked. By predicting and preventing threats at this early stage, HYAS Protect helps to secure the network against a wide range of potential cyber threats, from ransomware to phishing and beyond. This approach is designed to provide robust security by stopping threats before they can gain a foothold in the network.
Additionally, HYAS Protect also allows for active list management and advanced rule sets that users can configure to allow acceptable traffic while still dynamically blocking suspicious domains. There’s even an inspection mode that provides platform analytics and telemetry without actually blocking any sites — this can be useful when organizations first start with HYAS to understand the system without interrupting any workflows.
2. Customized AnalyticsHYAS Protect also offers insightful analysis that increases overall traffic visibility. Although people usually think of web browsing and clicking on email links as the biggest cybersecurity threats, Internet of Things (IoT) and operational technology (OT) devices are also at risk of compromise. Because they often run in the background, suspicious beaconing from IoT or OT devices may otherwise go undetected.
That’s where HYAS steps in. This isn't just user-generated traffic – this is machine-driven traffic, too. HYAS analytics identifies an organization’s riskiest users, riskiest devices and which domains are triggering the most blocked queries. The data gives a more comprehensive, security-focused picture than a typical static blocklist, and the detailed logs can expedite an investigation if needed.
3. Easy Integration Into Your Existing StackLastly, HYAS Protect is designed to work right out of the box. Our DNS resolver is fully cloud-based; it takes only a few minutes to deploy across your organization’s infrastructure. HYAS Protect also has an agent version compatible with all major operating systems, which is useful if you have company devices frequently roaming off the global network. With device-level installation, HYAS can still work even on public Wi-Fi networks in coffee shops or airport lounges.
HYAS also offers third-party integrations with major endpoint protection solutions including SentinelOne and Microsoft Defender. These systems work together — HYAS Protect parses data from endpoint detection and response programs to identify any DNS requests to suspicious infrastructure.
HYAS Protect Is the Public Sector Solution of ChoiceRecent recognition for HYAS includes the prestigious 2024 Govies Awards for the public Sector, 2024 Globee Cybersecurity Awards, and the 2024 Global InfoSec Awards.
In 2023, AV-TEST, considered the industry’s most rigorous third-party evaluator, gave HYAS Protect the highest efficacy rating of all PDNS solutions tested. This is particularly relevant in the public sector as cyberattacks increasingly target government agencies. To combat these threats, the NSA recommends PDNS as a core component of a multilayered security strategy, and HYAS is one of the providers meeting the NSA’s specifications.
Being effective in blocking the unknown and known threats is what HYAS is all about. No matter how sophisticated cyberattacks become, HYAS Protect keeps organizations one step ahead.
Additional LearningHow to Select a Protective DNS Solution
Watch a Demo of HYAS Protect Protective DNS
Guide to Protective DNS Security
AV-TEST evaluation of HYAS Protect
Want to talk to an expert to learn more about how Protective DNS can transform your organization? Contact us today to find out what HYAS security solutions can do for you.
The post Why Governments Worldwide Recommend Protective DNS appeared first on Security Boulevard.
The Amazon Web Services (AWS) Service Delivery designation is a specialized program designed to validate AWS Partners that have experience, deep technical expertise, and proven success delivering specific AWS services for clients. In October 2022, AWS announced a new designation for Amazon Elastic Kubernetes Service (Amazon EKS) that focuses on the proven ability to architect, run, and operate containerized workloads on Amazon EKS.
The post How Fairwinds Delivers On EKS Internally, AWS EKS Delivery Designation appeared first on Security Boulevard.
Authors/Presenters:Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree appeared first on Security Boulevard.