Incident Response

Google Launches Red Team to Secure AI Systems Against Attacks
Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by ...
Security Boulevard

‘China’ Azure Breach: MUCH Worse Than Microsoft Said
Richi Jennings | | Active Directory, Authentication, azure, Azure Active Directory, Azure AD, Entra ID, Exchange, Microsoft, Microsoft Azure, Microsoft Azure Active Directory, Microsoft Azure Security, OpenID, Outlook.com, SB Blogwatch, Storm-0558, Wiz
Storm-0558 Breaks: Satya and Pooh, sitting in a tree, K.I.S.S.I.N.G ...
Security Boulevard

Dell Adds Orchestration Capabilities to Data Protection Platform
Dell Technologies added orchestration capabilities to its data protection software that makes it simpler for IT teams to schedule backup ...
Security Boulevard

Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List
Richi Jennings | | android spyware, Biden administration, Commerce Department, Cytrox, Department of Commerce, Entity List, eu, Europe, European Union, European Union (EU), Intellexa, iOS spyware, Malware Spyware, Predator spyware, SB Blogwatch, spyware
European cousins Intellexa and Cytrox essentially banned by Commerce Dept. — Predator/ALIEN not welcome in U.S ...
Security Boulevard

PingSafe Emerges to Launch CNAPP That Simulates Cyberattacks
PingSafe today emerged from stealth to launch a cloud-native application protection platform (CNAPP) based on an engine that both detects vulnerabilities that cybercriminals might potentially exploit and enables cybersecurity teams to simulate ...
Security Boulevard

OPSEC FAIL: US Military Email Going to Mali — via Typo
Richi Jennings | | defense department, Department of Defense, DoD, E-mail, email, Johannes Zuurbier, Mali, military, Military Communications, mxrecords, pentagon, Russia, SB Blogwatch, U.S. Department of Defense, U.S. military, United States Department of Defense, US DOD, US Military
MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...
Security Boulevard

Why Pentesting-as-a-Service is Vital for Business Security
Eren Cihangir | | Attack Surface Management, Network Security, Penetration Testing, pentesting, pentesting-as-a-service, vulnerability
Conducting regular penetration tests (pentests) is a proactive option that identifies, evaluates and mitigates risks ...
Security Boulevard

Lockbit 3.0 Claims Credit for Ransomware Attack on Japanese Port
After a ransomware attack shuttered operations at container terminals at the Port of Nagoya in Japan, the Lockbit 3.0 ransomware gang claimed responsibility and demanded the port pay up. The attack on ...
Security Boulevard

China Breaches Microsoft Cloud — Spied on US Govt. Email
Richi Jennings | | Active Directory, Authentication, Azure Active Directory, Azure AD, Exchange, Microsoft, Outlook.com, SB Blogwatch, Storm-0558
Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Security Boulevard