Traceable AI, API security, APIs, Wallarm, Akamai, APIs, API security, threat modeling, ICS, VPNs, APIs, risk, left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

‘CosmicStrand’ Highlights Ongoing Firmware Risks

You’re not imagining things; new firmware threats are appearing more often. The most recent is CosmicStrand, which exploits the Unified Extensible Firmware Interface (UEFI) to avoid detection. The new UEFI rootkit, detailed ...
Security Boulevard
Aoqin Dragon WPA3 Dragonblood

Aoqin Dragon Has the Hallmarks of Chinese Espionage

Threat actor Aoqin Dragon continues its stealthy eight-year espionage campaign with attacks on targets primarily located in southeast Asia and Australia. The APT group typically targets government, education and telecommunications organizations, according ...
Security Boulevard
team, enterprise, remediation response crisis

Why Timely Response is Essential and How to Achieve It

Advanced persistent threats continue to test organizations’ strength by exploiting new vulnerabilities, organizing massive supply chain incidents and targeting specific industries. According to a study, 84% of enterprises globally acknowledge that cyberattacks ...
Security Boulevard
detection, campaigns, threat, HEAT, managed detection and response, Apache ActiveMQ, vulnerability, Aqua Cham, threat, elGang APT Meltdown Spectre Threat Detection

New APT Group Mimic Colonial Pipeline Attackers, Others

Government servers and Russian energy and aviation industries seem to be the primary targets of a new advanced persistent threat (APT) group that has attacked organizations in 10 countries, using the supply ...
Security Boulevard

Cybersecurity New Year’s Resolutions from the Information Security Forum

It’s that time of year again. Time for every one of us to reminisce on the past year and make resolutions for how we can do better in the year ahead–particularly in ...

Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles

Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or ...

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle ...
Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook

…and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of ...
Hackathon Uses Machine Learning to Improve Cybersecurity

Hackathon Uses Machine Learning to Improve Cybersecurity

Machine learning (ML) and artificial intelligence (AI) are hot technologies with significant promise for shaping the future, but it isn’t enough to understand ML or AI theory. Sure, you can gain a ...

6 Best Computer Forensic Analysis Tools

Computer forensics is of much relevance in today’s world. Though forensic analysis refers to searching and analyzing information to aid the process of finding evidence for a trial, computer forensic analysis is ...