Randall Munroe’s XKCD ‘Ingredientsl’
via the comic humor & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Ingredientsl’ appeared first on Security Boulevard.
via the comic humor & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Ingredientsl’ appeared first on Security Boulevard.
Discover why Escape is a better API security solution.
The post Escape vs Invicti appeared first on Security Boulevard.
Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS).
The post Biggest Ever DDoS is Threat to OT Critical Infrastructure appeared first on Security Boulevard.
Security teams can’t manage insider risk alone — cross-departmental collaboration is key to early risk identification and mitigation As a security leader, you have the critical responsibility of protecting your organization from insider events — both malicious and unintentional. However, managing insider risk is often like solving a puzzle with pieces scattered across different teams.…
The post How to Build Cross-Departmental Alliances to Tackle Insider Risk appeared first on Ontic.
The post How to Build Cross-Departmental Alliances to Tackle Insider Risk appeared first on Security Boulevard.
In a pig butchering scam, fake trading apps first available on Google and Apple apps stores and later on phishing download sites lured victims into depositing money into fraudulent accounts, which was then stolen, according to a report from Group-IB.
The post Fake Trading Apps for Android, iOS Lead to Pig Butchering Scam appeared first on Security Boulevard.
At Seceon’s 2024 Innovation and Certification Days, one of the standout sessions was a conversation between Tom Ertel, our SVP of Technical Sales at Seceon, Roger Newton Jr., the brain behind the SOC at Logically. Roger shared some real-world insights into how Logically, one of Seceon’s largest partners, battles ransomware and other cyber threats using
The post Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton appeared first on Seceon Inc.
The post Defeating Ransomware: Lessons from the Frontlines with Logically’s Roger Newton appeared first on Security Boulevard.
Authors/Presenters:Mike Wong, Murali Ramanujam, Guha Balakrishnan, Ravi Netravali
Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara; and via the organizations YouTube channel.
The post USENIX NSDI ’24 – MadEye: Boosting Live Video Analytics Accuracy with Adaptive Camera Configurations appeared first on Security Boulevard.
As Cyber Security Awareness Month (CSAM) kicks off, providing your team with accessible, engaging resources for CSAM is a great way to reinforce cybersecurity best practices.
The post The best resources for CSAM: Resources to send your team this month appeared first on Security Boulevard.
All announcements about Acunetix product updates and new releases are now exclusively available on our changelogs page. For each release, we publish notes to announce new features, new security checks, improvements, and bug fixes. Information about our latest product updates and previous release notes are...
The post Latest product updates appeared first on Acunetix.
The post Latest product updates appeared first on Security Boulevard.
The DOJ and Microsoft in a joint effort seized dozens of domains from a Russian-based threat group known as Star Blizzard, which for more than a year was targeting civil society groups like NGOs and journalist as well as government agencies in a spear-phishing campaign aimed at stealing information.
The post DOJ, Microsoft Take Down Domains Used by Russian-Backed Group appeared first on Security Boulevard.
Sonar introduces powerful AI-driven features, expanded support for new and existing languages and frameworks, and deeper security, all to elevate your code quality. These updates bring significant advancements for developers and teams.
The post SonarQube 10.7 Release Announcement appeared first on Security Boulevard.
Check out the best practices cyber agencies are promoting during Cybersecurity Awareness Month, as a report warns that staffers are feeding confidential info to AI tools. Meanwhile, a study highlights how business decisions can derail OT security. Plus, get the latest on Active Directory security, CISO salary trends and ransomware attacks!
Dive into six things that are top of mind for the week ending Oct. 4.
1 - CISA to promote MFA, software updates, phishing protection during Cybersecurity Awareness MonthOctober has arrived, and with it Cybersecurity Awareness Month, now in its 21st year. This global effort aims to make people aware of cyberthreats and to share cybersecurity best practices.
In the U.S., the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) are promoting their “Secure Our World” campaign. Specifically, they’re encouraging people to:
“Our focus is working with government and industry to raise cybersecurity awareness and help everyone, from individuals to businesses to all levels of government, stay safe online in our ever-connected world,” CISA Director Jen Easterly said in a statement.
As an official Champion of the CISA and NCA Cybersecurity Awareness Month effort, Tenable is committed to reducing risk, raising awareness and staying alert to the daily actions that help protect the world against cyberattacks.
Meanwhile, in the European Union, the EU Agency for Cybersecurity (ENISA) is focusing its awareness campaign on social engineering scams, such as phising and vishing.
“This threat category encompasses a wide range of activities that attackers deploy when attempting to gain access to either information or services through exploiting human error or behaviour,” reads an ENISA statement.
To get more details, check out:
Almost 40% of employees have fed sensitive work information to artificial intelligence (AI) tools without their employers’ knowledge, which highlights why organizations must urgently adopt AI usage policies and offer AI security training.
That’s one of many eye-opening findings in “Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024-2025,” published by the NCA as part of Cybersecurity Awareness Month.
Organizations must understand that employees inevitably will use generative AI, the report says, because of the productivity boost it offers; and that employees need guidance to understand the risks of using this technology.
Have you ever shared sensitive work information without your employer’s knowledge?
(Source: “Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024-2025” study by the National Cybersecurity Alliance, September 2024)
For example, more than half of employees surveyed (52%) said they hadn’t received any training on safe usage of AI.
“AI is here. You need watertight AI governance, and you need it yesterday,” reads the report, now in its fourth year and based on a survey of about 7,000 people ages 18 and up from Australia, Canada, Germany, India, New Zealand, the U.K. and the U.S..
Other key findings from the 139-page report include:
To get more details, check out:
How do business decisions impact the cybersecurity of operational technology (OT) systems in critical infrastructure organizations? That’s the key question tackled by a new guide authored by the Australian Cyber Security Centre (ACSC) in collaboration with cyber agencies from multiple other countries.
TItled “Principles of operational technology cyber security,” the document starts from the premise that it’s often difficult to determine how business decisions affect OT cybersecurity. Why? OT is extensively integrated into critical infrastructure organizations’ complex tech environments.
The 14-page document, published this week, aims to help critical infrastructure organizations “make decisions for designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as enable business continuity for critical services.”
Specifically, “Principles of operational technology cyber security” outlines these six key principles for creating and maintaining a secure OT environment in critical infrastructure organizations:
To get more details, read:
For more information about OT security, check out these Tenable resources:
Looking to boost your Active Directory defenses? Check out a new guide that details common AD attack techniques and offers recommended mitigations.
Published by cyber agencies from the Five Eyes countries – Australia, Canada, New Zealand, the U.K. and the U.S. – the guide “Detecting and Mitigating Active Directory Compromises” highlights critical AD weaknesses, including “permissive” default settings; complex relationships and permissions; and support for legacy protocols.
It explains how to detect and defend against 17 popular AD compromises, such as:
“By implementing the recommendations in this guidance, organisations can significantly improve their Active Directory security, and therefore their overall network security, to prevent intrusions by malicious actors,” the 68-page document reads.
Overview of Kerberoasting
(Source: Australian Cyber Security Centre, September 2024)
For more information about securing Active Directory, check out these Tenable resources:
Back in 2022, more than one-fifth of CISOs changed jobs. Today, the story looks very different, as job turnover rates for CISOs have dropped significantly. As a result, most salary increases are coming in the form of relatively modest merit raises.
That’s according to the “2024 CISO Compensation Benchmark Summary Report,” published this week by IANS Research and Artico Search, and based on a survey of 755 CISOs, most of them (91%) based in the U.S.
While 17% and 21% of surveyed CISOs went to work for a new company in 2021 and 2022, respectively, those job-change rates fell to 12% in 2023 and to 11% in the first half of this year.
With less turnover than in the past two to three years, the majority of CISOs (70%) have gotten annual merit-based raises – an average of 5.6% salary increase, and an overall average compensation bump of 6.3%.
“People have asked about salary depression in the security function but we see no evidence of it,” Steve Martano, an IANS faculty member and Artico Search cyber practice partner, said in a blog post.
Naturally, the ways to significantly boost your compensation are to either switch to a higher-paying job, or to receive a counteroffer or retention incentive from your current employer. Surveyed CISOs who went either of those routes got an average compensation boost of 31%. However, they were in the minority.
For more information about CISO trends:
Ransomware gangs turned up the heat in August, unleashing 14% percent more attacks than in July. The industrials sector was the hardest hit, receiving almost one fourth of all attacks, another sign of ransomware group’s interest in attacking critical infrastructure organizations.
That’s according to the NCC Group’s “Monthly Threat Pulse: Review of August 2024” report, which found that ransomware attacks rose year-on-year as well – up 16% compared with August 2023.
“The increase in ransomware attack figures this month is demonstrative of the continuing volatility of the threat landscape,” Matt Hull, Head of Threat Intelligence at NCC Group, said in a statement.
RansomHub ranked as the most active ransomware group, accounting for 16% of all attacks observed in August. This ransomware gang increased their number of attacks by 67% compared with July.
Ransomware Attacks by Threat Actors
(Source: NCC Group’s “Monthly Threat Pulse: Review of August 2024” report)
The post Cybersecurity Snapshot: Many Employees Overshare Work Info with AI Tools, Report Finds, as ‘Cybersecurity Awareness Month’ Kicks Off appeared first on Security Boulevard.
Following our recent investigations into the dangers of subdomain hijacking, we caught up with Prudence Malinki, Head of Industry Relations at Markmonitor, for some wise words of advice on the role policy can play in ensuring your DNS is secure.
The post The secret to secure DNS? It’s all in the policies appeared first on Security Boulevard.
The logistics and transportation sectors are the backbone of global trade, ensuring the seamless movement of goods across borders and industries. However, the increasing reliance on digital technologies, such as IoT devices, GPS tracking, and cloud-based management systems, has made this industry highly vulnerable to cyberattacks. In a business where delays, disruptions, or breaches can […]
The post Cybersecurity in Logistics and Transportation Sector: Key Threats and Challenges first appeared on StrongBox IT.
The post Cybersecurity in Logistics and Transportation Sector: Key Threats and Challenges appeared first on Security Boulevard.
The choice between CentOS vs Ubuntu depends on your specific needs: stability, support, security, and software ecosystem. While Ubuntu receives official support from Canonical, the last supported version of CentOS Linux, CentOS 7, reached end of life on June 30, 2024. TuxCare offers Extended Lifecycle Support for CentOS 6, 7, and 8, ensuring the continued […]
The post CentOS vs Ubuntu: Enterprise Linux Comparison appeared first on TuxCare.
The post CentOS vs Ubuntu: Enterprise Linux Comparison appeared first on Security Boulevard.
Cybersecurity basics remain crucial even after decades. Despite technological advances, simple practices like using strong passwords, enabling MFA, and staying alert to phishing are often overlooked due to our fast-paced lives. Slowing down to implement these measures prevents costly breaches and enhances overall security.
The post Why are we still talking about cybersecurity basics after all these years? appeared first on Security Boulevard.
As per recent reports, an Iranian Advanced Persistent Threat (APT) hacker is now playing a facilitator role in aiding remote access to target networks. The Iranian APT hacker is believed to have affiliations with the Ministry of Intelligence and Security (MOIS). In this article, we’ll dive into these Middle East cyberattacks and uncover all the […]
The post Iranian APT Facilitating Remote Access To Target Networks appeared first on TuxCare.
The post Iranian APT Facilitating Remote Access To Target Networks appeared first on Security Boulevard.
California's attempt to regulate deepfakes in political advertising through AB 2839 has sparked debate on free speech and election integrity. The legislation faces challenges in implementation, technological limitations, and platform responsibilities, highlighting complexities of governing AI.
The post California’s Deepfake Regulation: Navigating the Minefield of AI, Free Speech, and Election Integrity appeared first on Security Boulevard.
The Global Bot Security Report is out and the results are in: Health, Luxury, and E-Commerce are the least protected industries against simple bot attacks. Learn how your industry measures up.
The post E-Commerce Protection Lags Behind: Insights from the 2024 Global Bot Security Report appeared first on Security Boulevard.
Through our infiltration of the credential stuffing ecosystem, we reveal how various individuals collaborate to execute attacks and expose vulnerabilities for profit.
The post Exposing the Credential Stuffing Ecosystem appeared first on Security Boulevard.