Identity Management
Radware Report Surfaces Increasing Waves of DDoS Attacks
A report by Radware finds that DDoS attacks are increasing not only in number and volume, some lasting as long as 100 hours over six days ...
Security Boulevard
China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target
Richi Jennings | | CenturyLink, china, china espionage, China-linked Hackers, China-nexus cyber attacks, China-nexus cyber espionage, CVE-2024-39717, Lumen, Lumen Technologies, Peoples Republic of China, SB Blogwatch, Versa Director, Versa Neworks, VersaMem, Volt Typhoon
Xi whiz: Versa Networks criticized for swerving the blame ...
Security Boulevard
Insights from IBM’s 2024 Cost of a Data Breach Report
Enzoic | | Active Directory, Continuous Password Protection, credential screening, Data breaches, Password Security
The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year ...
Event Logging Key to Detecting LOTL Attacks, Security Agencies Say
A report by CISA, the FBI, the NSA, and international agencies lay out the argument that event logging tools help enterprises better detect attacks that rely on LOTL techniques used by threat ...
Security Boulevard
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent
Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program ...
Enzoic for Active Directory 3.5: Elevating Visibility Into Your Environment
Version 3.5 of Enzoic for Active Directory aims to provide greater visibility and control over your environment ...
The Golden Age of Impersonation: The Dual Role of AI in Cyber Attacks & Cyber Defense
Attacks today can be executed through a myriad of communication channels, including emails, social media and mobile applications. ...
Security Boulevard
Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning
A backdoor found in millions of Chinese-made RFID cards that are used by hotels and other businesses around the world can let bad actors instantly clone the cards to gain unauthorized access ...
Security Boulevard
Navigating the Uncharted: A Framework for Attack Path Discovery
Elad Shamir | | attack path analysis, attack-path-management, clean-source-principle, identity security
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the focus of the new course we will launch in October. In the previous post, I asked, ...
Extortion Group Exploits Cloud Misconfigurations, Targets 110,000 Domains
An unknown threat group leveraged publicly exposed environment variables in organizations' AWS accounts to exfiltrate sensitive data and demand ransoms in a wide-ranging extortion campaign that targeted 110,000 domains ...
Security Boulevard