Red Menshen budgets semiconductor data, secure, conflict, oil security tools budget dark, web, threat

The Chip War’s Impact on Cybersecurity and the Supply Chain

Semiconductors had their moment in the spotlight during the worst of the pandemic-induced supply chain disruptions. The shortage of semiconductors wreaked havoc on the industries that rely on them, opening up devices ...
Security Boulevard

Another Malware with Persistence

Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates. On Thursday, security firm Mandiant published a report that said threat actors with a suspected nexus to ...

BlackLotus Malware Hijacks Windows Secure Boot Process

Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully updated versions of Windows.” Dubbed BlackLotus, the ...
OSINT, Lazarus updates firmware open source Log4j OpenSSF API security dynamic code application

AMI Brings Secure Firmware to the Open Compute Project

The pool of available open source resilient firmware keeps growing. This week, dynamic firmware maker AMI announced the contribution of its Tektagon OpenEdition Platform Root of Trust to the Open Compute Project ...
Security Boulevard
trust digital transformation

A Basis of Trust For the IoT

In the classic grandchild scam, a con artist poses as an elderly victim’s grandchild over the phone or even in person to get “financial support.” Such scams take advantage of the fact ...
Security Boulevard
API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

‘CosmicStrand’ Highlights Ongoing Firmware Risks

You’re not imagining things; new firmware threats are appearing more often. The most recent is CosmicStrand, which exploits the Unified Extensible Firmware Interface (UEFI) to avoid detection. The new UEFI rootkit, detailed ...
Security Boulevard
zero-trust Implementing Zero-Trust Model

Why Zero-Trust Must Extend to Deep Infrastructure

It is a dramatic understatement to say that staying one step ahead of continually evolving cyberthreats like ransomware, malware and other severe attacks must be a top priority. Today’s global community of threat ...
Security Boulevard
Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition

Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition

Elon Musk buys Twitter for $44 billion so what does this mean for the privacy and cybersecurity of the platform? More than 100 different Lenovo laptop computers contain firmware-level vulnerabilities which is ...
mobile geofence 911 firmware

Firmware: Beyond Securing the Software Stack

Picture a house equipped with state-of-the-art alarm systems, sensors, locks and cameras. From the outside, the house might seem reasonably protected against potential intruders. However, if a savvy thief managed to infiltrate ...
Security Boulevard