Cybersecurity - Tagged - Security Boulevard The Home of the Security Bloggers Network Fri, 29 Mar 2024 17:29:18 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Cybersecurity - Tagged - Security Boulevard 32 32 133346385 Guarding Education: The Impact of Compromised Credentials https://securityboulevard.com/2024/03/guarding-education-the-impact-of-compromised-credentials/ https://securityboulevard.com/2024/03/guarding-education-the-impact-of-compromised-credentials/#respond Fri, 29 Mar 2024 17:29:18 +0000 https://www.enzoic.com/?p=82009 The education sector has increasingly become a target for cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to sensitive information.

The post Guarding Education: The Impact of Compromised Credentials appeared first on Enzoic.

The post Guarding Education: The Impact of Compromised Credentials appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/guarding-education-the-impact-of-compromised-credentials/feed/ 0 2013470
LockBit Hacker Sentenced To 4 Years Jail Plus Fined $860K https://securityboulevard.com/2024/03/lockbit-hacker-sentenced-to-4-years-jail-plus-fined-860k/ https://securityboulevard.com/2024/03/lockbit-hacker-sentenced-to-4-years-jail-plus-fined-860k/#respond Fri, 29 Mar 2024 07:00:33 +0000 https://tuxcare.com/?p=16731 Recent reports about legal proceedings, a 34-year-old Russian-Canadian national, Mikhail Vasiliev, has been handed a sentence of almost four years in Canadian prison. Vasiliev’s involvement in the global ransomware scheme known as LockBit led to this outcome. The United States Department of Justice (DoJ) initially charged him with conspiring to intentionally damage protected computers and […]

The post LockBit Hacker Sentenced To 4 Years Jail Plus Fined $860K appeared first on TuxCare.

The post LockBit Hacker Sentenced To 4 Years Jail Plus Fined $860K appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/lockbit-hacker-sentenced-to-4-years-jail-plus-fined-860k/feed/ 0 2013397
Building Strong Defences: The Intricacies of Effective Bot Mitigation – Part 1 https://securityboulevard.com/2024/03/building-strong-defences-the-intricacies-of-effective-bot-mitigation-part-1/ https://securityboulevard.com/2024/03/building-strong-defences-the-intricacies-of-effective-bot-mitigation-part-1/#respond Thu, 28 Mar 2024 21:04:55 +0000 https://www.kasada.io/?p=13294 Learn how you can assess a bot mitigation provider's ability to detect and stop bots in our new technical blog series.

The post Building Strong Defences: The Intricacies of Effective Bot Mitigation – Part 1 appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/building-strong-defences-the-intricacies-of-effective-bot-mitigation-part-1/feed/ 0 2013381
Secure Software Development: Best Practices, Frameworks, and Resources https://securityboulevard.com/2024/03/secure-software-development-best-practices-frameworks-and-resources-2/ https://securityboulevard.com/2024/03/secure-software-development-best-practices-frameworks-and-resources-2/#respond Thu, 28 Mar 2024 19:04:51 +0000 https://hyperproofdev.local/?p=9848 Just how important is building secure software today? Well, given the never-ending string of cyberattacks that succeed by taking advantage of software vulnerabilities, it’s become essential for organizations to purchase and use only the safest software.  Consider some examples of software vulnerabilities gone wrong, of which we have no shortage:  Not only can customers suffer...

The post Secure Software Development: Best Practices, Frameworks, and Resources appeared first on Hyperproof.

The post Secure Software Development: Best Practices, Frameworks, and Resources appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/secure-software-development-best-practices-frameworks-and-resources-2/feed/ 0 2013519
Cybersecurity Synergy: Navigating Known and Unknown Threats with LogRhythm Axon and CimTrak https://securityboulevard.com/2024/03/cybersecurity-synergy-navigating-known-and-unknown-threats-with-logrhythm-axon-and-cimtrak/ https://securityboulevard.com/2024/03/cybersecurity-synergy-navigating-known-and-unknown-threats-with-logrhythm-axon-and-cimtrak/#respond Thu, 28 Mar 2024 14:00:00 +0000 https://www.cimcor.com/blog/cybersecurity-synergy-logrhythm-axon-and-cimtrak Cimcor x LogRhythm

This podcast episode explores the unique collaboration between LogRhythm Axon and CimTrak, two cutting-edge cybersecurity solutions. Our experts, LogRhythm's Josh King and Cimcor's Justin Chandler discuss how these technologies make security easy, providing insights into reducing security noise and enhancing decision-making capabilities within the Cloud. The podcast can be listened to in its entirety below. 

The post Cybersecurity Synergy: Navigating Known and Unknown Threats with LogRhythm Axon and CimTrak appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/cybersecurity-synergy-navigating-known-and-unknown-threats-with-logrhythm-axon-and-cimtrak/feed/ 0 2013348
SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery  https://securityboulevard.com/2024/03/sccm-exploitation-account-compromise-through-automatic-client-push-ad-system-discovery/ https://securityboulevard.com/2024/03/sccm-exploitation-account-compromise-through-automatic-client-push-ad-system-discovery/#respond Thu, 28 Mar 2024 12:25:00 +0000 https://www.guidepointsecurity.com/?p=28183 Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account […]

The post SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery  appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/sccm-exploitation-account-compromise-through-automatic-client-push-ad-system-discovery/feed/ 0 2013366
Hackers Target Chinese With Notepad++ and Vnote Installers https://securityboulevard.com/2024/03/hackers-target-chinese-with-notepad-and-vnote-installers/ https://securityboulevard.com/2024/03/hackers-target-chinese-with-notepad-and-vnote-installers/#respond Thu, 28 Mar 2024 07:00:19 +0000 https://tuxcare.com/?p=16735 In a recent revelation by cybersecurity experts at Kaspersky Labs, a concerning cyber threat has emerged targeting users of popular text editing software in China. This sophisticated attack involves the distribution of altered versions of well-known editors like Notepad++ and Vnote Installers, aimed at infiltrating users’ systems with harmful malware.   Notepad++ and Vnote Installers […]

The post Hackers Target Chinese With Notepad++ and Vnote Installers appeared first on TuxCare.

The post Hackers Target Chinese With Notepad++ and Vnote Installers appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/hackers-target-chinese-with-notepad-and-vnote-installers/feed/ 0 2013294
How to Tell if an Email is a Scam? https://securityboulevard.com/2024/03/how-to-tell-if-an-email-is-a-scam/ https://securityboulevard.com/2024/03/how-to-tell-if-an-email-is-a-scam/#respond Wed, 27 Mar 2024 14:32:45 +0000 https://powerdmarc.com/?p=55639 Reading Time: 9 min Wondering if the email you just received is a scam? Learn how to spot email scams & and use scam email checkers to protect yourself from crafty phishers!

The post How to Tell if an Email is a Scam? appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/how-to-tell-if-an-email-is-a-scam/feed/ 0 2013241
Macro Segmentation vs. Micro Segmentation https://securityboulevard.com/2024/03/macro-segmentation-vs-micro-segmentation/ https://securityboulevard.com/2024/03/macro-segmentation-vs-micro-segmentation/#respond Wed, 27 Mar 2024 12:41:06 +0000 https://truefort.com/?p=4149 Understanding the distinction between macro segmentation vs. micro segmentation, and making the right choice  Within network security segmentation, macro segmentation vs. micro segmentation are crucial methods to consider for organizations aiming to protect their digital assets. Though distinct in their approach and execution, these strategies serve the common purpose of minimizing the attack surface and...

The post Macro Segmentation vs. Micro Segmentation appeared first on TrueFort.

The post Macro Segmentation vs. Micro Segmentation appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/macro-segmentation-vs-micro-segmentation/feed/ 0 2013177
Security Vulnerability in Saflok’s RFID-Based Keycard Locks https://securityboulevard.com/2024/03/security-vulnerability-in-safloks-rfid-based-keycard-locks/ https://securityboulevard.com/2024/03/security-vulnerability-in-safloks-rfid-based-keycard-locks/#respond Wed, 27 Mar 2024 11:01:08 +0000 https://www.schneier.com/?p=68655 It’s pretty devastating:

Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. The Saflok systems are installed on 3 million doors worldwide, inside 13,000 properties in 131 countries. By exploiting weaknesses in both Dormakaba’s encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock. Their technique starts with obtaining any keycard from a target hotel—say, by booking a room there or grabbing a keycard out of a box of used ones—then reading a certain code from that card with a $300 RFID read-write device, and finally writing two keycards of their own. When they merely tap those two cards on a lock, the first rewrites a certain piece of the lock’s data, and the second opens it...

The post Security Vulnerability in Saflok’s RFID-Based Keycard Locks appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/security-vulnerability-in-safloks-rfid-based-keycard-locks/feed/ 0 2013133