OSINT, Lazarus updates firmware open source Log4j OpenSSF API security dynamic code application

Lazarus Assault Via 3CX Exposes Need to Rethink Security

When North Korean threat actors the Lazarus Group exploited a legitimate update to the 3CXDesktopApp—a softphone application from 3CX—security professionals didn’t initially pick up on the import of the activity and tactics ...
Security Boulevard
GitHub connections digital pipeline GitHub ICS Risk

Supply Chain Dependency: What Your GitHub Connections May Trigger

The writing is on the walls, and it’s hard to avoid after the significant spike in attacks against GitHub repositories. The recent CircleCI breach, in which customers’ secrets and encryption keys were ...
Security Boulevard
Wiz data breach enterprise Lapsus$ data scraping SolarWinds

Teen Mastermind Behind Lapsus$ Ransomware Attacks

Just when it looked like a tired hacker stereotype was fading, it seems that a teenager orchestrated Lapsus$ attacks against high-profile targets like Microsoft and Nvidia—all from the comfort of the home ...
Security Boulevard
supply chain

Supply Chain Security – Not As Easy As it Looks

The massive exploit of SolarWinds is a prime example of what is called a “supply chain” vulnerability. The vast majority of those impacted by the Russian SolarWinds attack probably had never even ...
Security Boulevard
Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Kaseya Starts Recovery After REvil Attack

Kaseya is now reporting the software-as-a-service (SaaS) instance of its Virtual System Administrator (VSA) platform will be back online sometime between 4:00 p.m. and 7:00 p.m. EST today. It expects the on-premises ...
Security Boulevard
Three wise monkeys

REvil Makes Monkeys out of Kaseya Customers

Over the long weekend, a huge ransomware attack emerged. Kaseya seems to have been the common component ...
Security Boulevard
5 Ways to Protect Software Supply-Chains From Malicious Attackers

5 Ways to Protect Software Supply-Chains From Malicious Attackers

| | security, supply chain attack
Protecting against supply-chain attacks is imperative for companies and organizations. In order to avoid making a small mistake that could put a company’s data at risk, supply-chain attacks need to be prevented ...
Wiz data breach enterprise Lapsus$ data scraping SolarWinds

Best of 2020: The SolarWinds Supply Chain Hack: What You Need to Know

As we close out 2020, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the first in our series of the Best of 2020 ...
Security Boulevard
FireEye Hack Turns into a Global Supply Chain Attack

FireEye Hack Turns into a Global Supply Chain Attack

The FireEye hack turned into a global supply chain attack affecting thousands of SolarWinds customers around the world. The post FireEye Hack Turns into a Global Supply Chain Attack appeared first on ...