Cloud Security
Spoofed Rocket Alert App Targets Israeli Android Users with Spyware
As violence and protests spread in the chaotic war between Israel and Hamas, evidence of the parallel battle going on in cyberspace continue to emerge. It started almost immediately after the initial ...
Security Boulevard
Digital Identity Firms Being Bolstered by Investments
Investment money is flowing into a fast-growing digital identity solutions market that is being fueled by the ongoing increase in data breaches launched via identity scams, a government focus on the issue, ...
Security Boulevard
Why Mutual TLS (Mtls) Is Critical For Securing Microservices Communications In A Service Mesh
Krupa Patil | | certificate authority, Kubernetes, mTLS, PKI, service mesh, tls authentication, TLS certificate
The rise of containerization and Kubernetes has catalyzed a widespread adoption of microservices architecture for packaging and deploying cloud-native applications. According to a recent report, 85% of surveyed companies said they are ...
Cisco Zero-Day: As Bad as it Gets — and No Fix 4 Weeks in
Richi Jennings | | 0-day, 0-day exploits, 0-day vulnerability, 0day, cisco, Cisco IOS XE, CVE-2023-20198, SB Blogwatch, Zero Day Attacks, zero-day, Zero-Day Bug, Zero-day Exploit, zero-day exploits, zero-day flaw, zero-day flaws, zero-day threat, zero-day vulnerabilities, Zero-day Vulnerability, zero-days, zeroday, zerodayvulnerabilities
Keeping us in suspense—It doesn’t get worse than this: CVE-2023-20198 is CVSS=10 ...
Security Boulevard
Taking Stock of Identity Solutions in the Age of AI
Branden Williams | | Artificial Intelligence, Cybersecurity, Decentralized Identity, identity threat detection and response, Identity Verification
Security pros can use ITDR and DCI in conjunction to combat security threats in the age of AI ...
Security Boulevard
RomCom Malware Group Targets EU Gender Equality Summit
A hacker group that continues to extend its reach from financially motivated attacks into cyber-espionage this summer targeted attendees of a gender equality conference with a pared-down version of the RomCom remote ...
Security Boulevard
Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Richi Jennings | | Australia, Australian Government, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child security online, child sexual exploitation, childpornography, CSAM, Digital Trust and Safety, Elon Musk, elon musk twitter, eSafety Commission, grooming, Julie Inman Grant, Linda Yaccarino, SB Blogwatch, trust and safety, Twitter, X
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Security Boulevard
Microsoft Launches an AI Bug Bounty Program
As Microsoft aggressively integrates AI into its broad portfolio of products and services, the IT giant now is looking for help to ensure they are free of vulnerabilities. The company this month ...
Security Boulevard
Did You Miss it? Top 5 Best Moments from the ACCESS Summit
Reading Time: 6 minutes Sonrai Security hosted the inaugural ACCESS: The Cloud Identity, Access, and Permissions Summit this October. The ACCESS Summit is a free, virtual, and learning-based summit gathering cloud experts ...
NSA Releases EliteWolf GitHub Repository for Securing OT Environments
The National Security Agency released a code repository in GitHub to make it easier for critical infrastructure organizations and similar entities to better identify and detect potentially malicious activities in their operational ...
Security Boulevard