Attack Surface

From LLMs to Cloud Infrastructure: F5 Aims to Secure the New AI Attack Surface
John D. Boyle | | AI, AI attacks, APIs, Attack Surface, Cybersecurity, f5, LLM, model poisoning, multicloud, rsac, security, zero trust
Accelerate human-led innovation, automate the grunt work and make sure AI delivers real value without proliferating new security risks. ...
Security Boulevard

CISA Alert Calls Out Operating System Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) in partnership with the Federal Bureau of Investigations (FBI) has jointly issued a Secure by Design Alert in response to threat actor campaigns that exploit ...
Security Boulevard

Airsoft Data Breach Exposes Data of 75,000 Players
Nathan Eddy | | Airsoft, Attack Surface, Data breach, email, gaming, MFA, passwords, pii, social engineering, user data
Failure to configure authentication allowed malicious actors to exploit Airsoftc3.com's database, exposing the sensitive data of a vast number of the gaming site's users ...
Security Boulevard

Ordr Taps AI to Augment Attack Surface Management
Michael Vizard | | AI, ASM, asset management, Attack Surface, Attack Surface Management, generative AI, Ordr
Ordr this week added an attack surface management (ASM) tool infused with artificial intelligence (AI) to its existing asset management portfolio ...
Security Boulevard

Beware of OpenAI and ChatGPT-4 Turbo in Healthcare Orgs’ API Attack Surface
Doug Dooley | | API security, Attack Surface, ChatGPT, Cybersecurity, health care, healthcare, OpenAI
With every new healthcare API integration that OpenAI gets access to, the attack surface grows, creating new opportunities for attackers ...
Security Boulevard

Elevate Your Security: Meet Modern Attacks With Advanced CSPM
Gilad Elyashar | | Attack Surface, Cloud Security, Cloud security posture management, cspm, Cybersecurity
Modern security teams need the capabilities of real-time CSPM to work across multiple clouds and environments to prevent employee burnout and maximize strong security posture ...
Security Boulevard

Battling Cybercrime by Combining ASM With CTI
Organizations are increasingly turning to attack surface management (ASM) and cyberthreat intelligence (CTI) as essential components of their cybersecurity programs ...
Security Boulevard

Vulcan Cyber Adds Graph Tool to Better Manage Attack Surfaces
Vulcan Cyber unveiled graph technology tool that will make it simpler to visualize cybersecurity attack paths and measure the impact those attacks might have on an organization ...
Security Boulevard

Cybersecurity Needs to Mitigate Complexity
Complexity is the enemy of security. Akamai’s Steve Winterfeld explains what to do to combat complexity in cybersecurity ...
Security Boulevard

Attack Surface Management Vs. Vulnerability Management
Marc Gaffan | | ASM, Attack Surface, Attack Surface Management, vm, Vulnerabilities, Vulnerability Management
Cybersecurity is full of acronyms. So many, in fact, that I would be hard-pressed to find someone who knows what they all stand for or clearly explain the subtle differences between many ...
Security Boulevard