Boulevard Press

Can Compensating Controls Be the Answer in a Sea of Vulnerabilities? 

The relentless churn of cyber security news creates a suffocating sense of vulnerability overload. New exploits surface daily, their details splashed across the web like a constant reminder of our and our organization’s fragile existence. We are bombarded with alerts, an endless list of “urgent vulnerabilities” that breeds a crippling sense of patching fatigue. The The post Can..

Read More

Several ImageMagick Vulnerabilities Addressed in Ubuntu

ImageMagick, a popular image manipulation program and library, has been exposed to several vulnerabilities that could leave your system vulnerable to denial-of-service (DoS) attacks. In response, the Ubuntu security team has promptly released security updates to address these issues across various Ubuntu releases. Let’s delve into the details of these vulnerabilities and their mitigation..

Read More

DarkGate Malware Campaign Exploits Patched Microsoft Flaw

The Zero Day Initiative (ZDI) by Trend Micro uncovered a phishing campaign that exploited a patched Microsoft flaw to infect devices with DarkGate malware. CVE-2024-21412 was the Microsoft patch that was exploited by using fake software installers. PDFs containing Google DoubleClick Digital Marketing (DDM) open redirects were used to lure users to download the malicious The post DarkGate Malware..

Read More

Risky Business: How HR Tech is Contributing to SaaS Risks

In today’s digital-first world, individuals are bringing B2C behaviors into the B2B sphere. Just as someone might casually share personal login details with platforms like Turbotax for tax filing, many are now sharing corporate credentials with third-party providers for various personal and professional tasks. A recent investigation by Obsidian’s Threat Research team has shed light The post..

Read More

DLP Isn’t Dying – It’s Shifting Left to DSPM

At Symmetry, our mission has always been to safeguard the world’s data. We realize that with this lofty mission, we can’t do this alone. Traditional Data Loss Prevention (DLP) solutions have a strong focus on the network, endpoints and email. As a result, they have been effective in reducing preventable data breaches and unauthorized data The post DLP Isn’t Dying - It’s Shifting Left to..

Read More