Israel Hamas spyware Android

Spoofed Rocket Alert App Targets Israeli Android Users with Spyware

As violence and protests spread in the chaotic war between Israel and Hamas, evidence of the parallel battle going on in cyberspace continue to emerge. It started almost immediately after the initial ...
Security Boulevard
identity breaches authentication

Digital Identity Firms Being Bolstered by Investments

Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, ...
Security Boulevard
AppViewX KUBE+ for fast, agile, and automated certificate lifecycle management across Kubernetes

Why Mutual TLS (Mtls) Is Critical For Securing Microservices Communications In A Service Mesh

The rise of containerization and Kubernetes has catalyzed a widespread adoption of microservices architecture for packaging and deploying cloud-native applications. According to a recent report, 85% of surveyed companies said they are ...
AI, identity, FraudGPT identity, risk, CrowdStrike digital identitiies Identity Theft Financial Fraud Digital Age

Taking Stock of Identity Solutions in the Age of AI

Security pros can use ITDR and DCI in conjunction to combat security threats in the age of AI ...
Security Boulevard
RomCom malware cybersecurity espionage

RomCom Malware Group Targets EU Gender Equality Summit

A hacker group that continues to extend its reach from financially motivated attacks into cyber-espionage this summer targeted attendees of a gender equality conference with a pared-down version of the RomCom remote ...
Security Boulevard
vulnerable Bugcrowd to Advance DevSecOps

Microsoft Launches an AI Bug Bounty Program

As Microsoft aggressively integrates AI into its broad portfolio of products and services, the IT giant now is looking for help to ensure they are free of vulnerabilities. The company this month ...
Security Boulevard
Did You Miss it? Top 5 Best Moments from the ACCESS Summit

Did You Miss it? Top 5 Best Moments from the ACCESS Summit

| | Cloud Security
Reading Time: 6 minutes Sonrai Security hosted the inaugural ACCESS: The Cloud Identity, Access, and Permissions Summit this October. The ACCESS Summit is a free, virtual, and learning-based summit gathering cloud experts ...
NSA cybersecurity OT

NSA Releases EliteWolf GitHub Repository for Securing OT Environments

| | cisa, Cybersecurity, GitHub, nsa
The National Security Agency released a code repository in GitHub to make it easier for critical infrastructure organizations and similar entities to better identify and detect potentially malicious activities in their operational ...
Security Boulevard