Tuesday, August 16, 2022
  • XKCD ‘Unreliable Connection’
  • Aspen Security Forum 2022 – Moderator: Peter Baker – Fireside Chat On The Future Of Taiwan With Mark Esper
  • Is Too Much Automation an Issue for Security Operations?
  • 3 Important Things to Know About Cookie Security
  • 9 Steps to Create a Data Loss Prevention Policy

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Industry Trends

Bots Breaking Bad: Stolen Pharmacy Accounts Up for Sale

Bots Breaking Bad: Stolen Pharmacy Accounts Up for Sale

Kasada | August 7, 2022 | account takeover, Bot Defense, bot detection, bot detection software, bot management, bot mitigation, bot protection, credential stuffing, Industry Trends, scalper bots, stolen accounts
By Kasada Threat Research Team Using Bots to Steal Pharmacy Accounts and Resell Prescriptions For the first time, Kasada threat intelligence observed the use of credential stuffing to attack pharmacies, steal customer ...
Kasada
The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors

The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors

Jono Hope | May 12, 2022 | Industry Trends
We need to talk about a dirty not-so-little secret in the bot mitigation industry. Enterprising actors in the underground bot economy are creating and selling APIs that “solve” or bypass specific bot ...
Kasada

Earth Day Digital Waste Cleanup

Katie Humble | April 26, 2022 | Business & Tech, Industry Trends, Infosec Blog, Perspectives
When Earth Day comes around, many people picture planting trees and picking up trash. But taking action to protect the planet goes beyond the physical realm.  The internet and all its connected ...
Hurricane Labs

Earth Day Digital Waste Cleanup

Katie Humble | April 22, 2022 | Business & Tech, Industry Trends, Infosec Blog, Perspectives
When Earth Day comes around, many people picture planting trees and picking up trash. But taking action to protect the planet goes beyond the physical realm.  The internet and all its connected ...
Hurricane Labs

Getting Started with Automation Before You’re Ready to SOAR

Josh Silvestro, Tom Kopchak and Toby Deemer | April 13, 2022 | Industry Trends, Infosec Blog, security, Splunk
The benefits of automating aspects of your security tasks include the ability to remove human error, reduce redundant or recurring tasks, and shorten the time to taking action when responding to a ...
Hurricane Labs

Cequence Named a Strong Performer in The Forrester Wave™: Bot Management

Ameya Talwalkar | April 12, 2022 | analyst, API security, bot management, Company News, Forester Wave, Forrester, Industry Research, Industry Trends
As a Co-founder and Chief Product Officer, I am happy to read the latest Forrester WaveTM Bot Management, Q2 2022, where Cequence is named as a strong performer. Highlights from the report ...
Cequence
Spring4Shell Zero-Day Vulnerability: While You’re Waiting for Your WAF

Spring4Shell Zero-Day Vulnerability: While You’re Waiting for Your WAF

Neil Cohen | March 31, 2022 | Industry Trends, Product
Spring4Shell CVE-2022-22965 A newly disclosed remote code execution vulnerability in Spring Core, a widely used Java framework, has been identified. Exploitation of CVE-2022-22965 has been confirmed as a means of enabling unauthenticated ...
Kasada
Buy Now Pay Later (BNPL) Fraud – Stopping Automated Attacks While Reducing Friction

Buy Now Pay Later (BNPL) Fraud – Stopping Automated Attacks While Reducing Friction

Maddy Lewis | March 2, 2022 | Industry Trends
The Buy Now Pay Later (BNPL) industry is still relatively new, but accounted for 2.1% of all global e-commerce transactions in 2021 (nearly $97 billion) and is expected to double by 2024, ...
Kasada
Detecting Automated Vulnerability Scanners: Log4j Zero-Day Vulnerability Case Study

Detecting Automated Vulnerability Scanners: Log4j Zero-Day Vulnerability Case Study

Jonathon Doherty | February 15, 2022 | Industry Trends, Product
Log4j CVE-2021-44228 Since its discovery, much has already been said about the vulnerability discovered within the Log4j logging framework, CVE-2021-44228. Similar to Heartbleed and Shellshock from the prior decade, the effects on ...
Kasada
Valentine’s Day 2022 – Kiss Bad Bots Goodbye

Valentine’s Day 2022 – Kiss Bad Bots Goodbye

Maddy Lewis | February 1, 2022 | Industry Trends
With the first major eCommerce holiday of the year rapidly approaching, Valentine’s Day is projected to surpass last year’s sales of $21 billion USD, nearly a third of which was generated through ...
Kasada
Load more Loading...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face
Black Hat 2022 Trip Report
Cowbell Cyber Allies With Swiss Re on AWS Cyberinsurance
Lowering Cyberinsurance Premiums with Managed Security Services
API Security Requires Everyone’s Support
Ransomware attack blamed for closure of all 7-Eleven stores in Denmark
The state of cybersecurity: ‘Things are going to get worse before they get better,’ Krebs tells Black Hat 2022
What is a Zero Trust Environment? | HYPR
Supply Chain Cybersecurity – the importance of everyone
Cybersecurity Insights with Contrast CISO David Lindner | 8/12

Upcoming Webinars

Wed 17

Code Tampering: Four Keys to Pipeline Integrity

August 17 @ 1:00 pm - 2:00 pm
Mon 22

API Security

August 22 @ 1:00 pm - 2:00 pm
Wed 24

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

August 24 @ 1:00 pm - 2:00 pm
Tue 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Industry Spotlight

Gmail Lets Candidates Spam You — FEC FAIL
Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity DevOps Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches 

Gmail Lets Candidates Spam You — FEC FAIL

August 15, 2022 Richi Jennings | Yesterday 0
MiCODUS Car Trackers are SUPER Vulnerable and Dangerous
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

July 21, 2022 Richi Jennings | Jul 21 0
How AI Secures the Future of Digital Payments
Application Security Cloud Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

How AI Secures the Future of Digital Payments

July 18, 2022 Natasha Lane | Jul 18 0

Top Stories

Incident Response Teams Fight Back With Virtual Patching
Cybersecurity Endpoint Incident Response News Security Awareness Security Boulevard (Original) Threat Intelligence 

Incident Response Teams Fight Back With Virtual Patching

August 16, 2022 George V. Hulme | 5 hours ago 0
Lacework Adds Time Series Modeling to Cybersecurity Platform
Featured News 

Lacework Adds Time Series Modeling to Cybersecurity Platform

August 15, 2022 Michael Vizard | Yesterday 0
Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Endpoint Featured Identity & Access Incident Response Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face

August 12, 2022 Richi Jennings | 3 days ago 0

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.