Security Boulevard https://securityboulevard.com/ The Home of the Security Bloggers Network Tue, 25 Jul 2023 08:30:57 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Security Boulevard https://securityboulevard.com/ 32 32 133346385 Account takeover fraud: 5 steps for protecting your customers https://securityboulevard.com/2023/07/account-takeover-fraud-5-steps-for-protecting-your-customers-2/ https://securityboulevard.com/2023/07/account-takeover-fraud-5-steps-for-protecting-your-customers-2/#respond Tue, 25 Jul 2023 08:30:57 +0000 https://technospike.hraap.com/?p=2089 According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before the pandemic. This number is expected to rise further as the digital ecosystem expands, enlarging the surface area culpable to attack. Account takeover fraud is one of the most common fraud types, and institutions must… Continue reading Account takeover fraud: 5 steps for protecting your customers

The post Account takeover fraud: 5 steps for protecting your customers appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/account-takeover-fraud-5-steps-for-protecting-your-customers-2/feed/ 0 1982623
Seven Common Lateral Movement Techniques https://securityboulevard.com/2023/07/seven-common-lateral-movement-techniques/ https://securityboulevard.com/2023/07/seven-common-lateral-movement-techniques/#respond Tue, 25 Jul 2023 07:43:11 +0000 https://truefort.com/?p=3355 Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques   Lateral movement techniques refer to the methods employed by attackers to move through a network, seeking to escalate privileges, access sensitive data, or achieve persistence. A common and insidious practice, making the most of the common lateral movement techniques is the bread and butter...

The post Seven Common Lateral Movement Techniques appeared first on TrueFort.

The post Seven Common Lateral Movement Techniques appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/seven-common-lateral-movement-techniques/feed/ 0 1982625
Antisocial Media and Critical National Infrastructure https://securityboulevard.com/2023/07/antisocial-media-and-critical-national-infrastructure/ https://securityboulevard.com/2023/07/antisocial-media-and-critical-national-infrastructure/#respond Tue, 25 Jul 2023 07:37:25 +0000 http://chainmailcheck.wordpress.com/?p=1783 [For some reason I posted this several months ago on my Dataholics blog, when this one might have been at least as obvious a place to put it. I haven’t anything new to say on the topic: I’m just putting it here for completeness.] There was never much chance of my opening an account on […]

The post Antisocial Media and Critical National Infrastructure appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/antisocial-media-and-critical-national-infrastructure/feed/ 0 1982619
API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP https://securityboulevard.com/2023/07/api-discovery-definition-importance-and-step-by-step-guide-on-apptrana-waap/ https://securityboulevard.com/2023/07/api-discovery-definition-importance-and-step-by-step-guide-on-apptrana-waap/#respond Tue, 25 Jul 2023 05:59:54 +0000 https://www.indusface.com/?p=23843 The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches reveals that US companies could face losses ranging from $12.

The post API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP appeared first on Indusface.

The post API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/api-discovery-definition-importance-and-step-by-step-guide-on-apptrana-waap/feed/ 0 1982628
Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia https://securityboulevard.com/2023/07/infoline-launches-logrhythm-powered-soc-to-deliver-crucial-cybersecurity-services-in-malaysia/ https://securityboulevard.com/2023/07/infoline-launches-logrhythm-powered-soc-to-deliver-crucial-cybersecurity-services-in-malaysia/#respond Tue, 25 Jul 2023 01:00:19 +0000 https://logrhythm.com/?p=120392 SINGAPORE, July 25, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced their partnership with Infoline Tec Group Berhad, an established IT infrastructure and cybersecurity service provider. With this…

The post Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia appeared first on LogRhythm.

The post Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/infoline-launches-logrhythm-powered-soc-to-deliver-crucial-cybersecurity-services-in-malaysia/feed/ 0 1982615
What Comes After Your SIEM Purchase? https://securityboulevard.com/2023/07/what-comes-after-your-siem-purchase/ https://securityboulevard.com/2023/07/what-comes-after-your-siem-purchase/#respond Mon, 24 Jul 2023 21:34:50 +0000 https://logrhythm.com/?p=120878 Let’s say you recently acquired a security information and event Management (SIEM) solution and have a new layer of defense in the war against cybercriminals. What comes next?  Gaining Quick Time to Value from Your Deployment  During the sales process,…

The post What Comes After Your SIEM Purchase? appeared first on LogRhythm.

The post What Comes After Your SIEM Purchase? appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/what-comes-after-your-siem-purchase/feed/ 0 1982617
New Zenbleed Vulnerability: What It Is, How to Fix It https://securityboulevard.com/2023/07/new-zenbleed-vulnerability-what-it-is-how-to-fix-it/ https://securityboulevard.com/2023/07/new-zenbleed-vulnerability-what-it-is-how-to-fix-it/#respond Mon, 24 Jul 2023 19:46:07 +0000 https://www.deepfactor.io/?p=4079 Zenbleed (CVE-2023-20593) was announced today. This is a vulnerability affecting AMD processors based on the Zen2 microarchitecture (certain EPYC CPUs used in datacenter servers and Ryzen/Threadripper CPUs used in desktop/laptop computers). The bug is a speculative execution bug, but somewhat different from the speculative execution side channel bugs we’ve seen in the past (eg, Meltdown... Read more »

The post New Zenbleed Vulnerability: What It Is, How to Fix It appeared first on Deepfactor.

The post New Zenbleed Vulnerability: What It Is, How to Fix It appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/new-zenbleed-vulnerability-what-it-is-how-to-fix-it/feed/ 0 1982613
IBM: Cost of a Data Breach Hits Another High https://securityboulevard.com/2023/07/ibm-cost-of-a-data-breach-hits-another-high/ Mon, 24 Jul 2023 19:42:53 +0000 https://securityboulevard.com/?p=1982511 data breach IBM governance, policies, protection deep web data governance compliant leak database security

The average cost to an organization hit with a data breach reached a record high this year, though those companies are split on who they believe should foot the bill, according to a report released today by IBM.

The post IBM: Cost of a Data Breach Hits Another High appeared first on Security Boulevard.

]]>
1982511
Lost transparency, blackbox ML, and other hidden risks of outsourced fraud solutions https://securityboulevard.com/2023/07/lost-transparency-blackbox-ml-and-other-hidden-risks-of-outsourced-fraud-solutions/ https://securityboulevard.com/2023/07/lost-transparency-blackbox-ml-and-other-hidden-risks-of-outsourced-fraud-solutions/#respond Mon, 24 Jul 2023 19:21:40 +0000 https://blog.sift.com/?p=5160 Machine learning-based fraud decision engines are sometimes viewed as mysterious black boxes that only provide minimal insight into why a decision was made on a login or a transaction. It’s a valid concern; not all fraud solution providers provide intuitive decision explainability. Some solutions fail to provide any transparency at all on the transactions they […]

The post Lost transparency, blackbox ML, and other hidden risks of outsourced fraud solutions appeared first on Sift Blog.

The post Lost transparency, blackbox ML, and other hidden risks of outsourced fraud solutions appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/lost-transparency-blackbox-ml-and-other-hidden-risks-of-outsourced-fraud-solutions/feed/ 0 1982569
Google Launches Red Team to Secure AI Systems Against Attacks https://securityboulevard.com/2023/07/google-launches-red-team-to-secure-ai-systems-against-attacks/ Mon, 24 Jul 2023 19:06:16 +0000 https://securityboulevard.com/?p=1982549 red team SEC data security privacy How to Bring DevOps and Security Teams Closer Together

Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by cybercriminals.

The post Google Launches Red Team to Secure AI Systems Against Attacks appeared first on Security Boulevard.

]]>
1982549