Security Bloggers Network

Account takeover fraud: 5 steps for protecting your customers
According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before the pandemic. This number is expected to rise further as the digital ...
Seven Common Lateral Movement Techniques
Nik Hewitt | | advice, Best Practices, lateral movement, next gen security, security, Security Research
Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques Lateral movement techniques refer to the methods employed by attackers to move through a network, seeking to escalate privileges, access sensitive ...
Antisocial Media and Critical National Infrastructure
[For some reason I posted this several months ago on my Dataholics blog, when this one might have been at least as obvious a place to put it. I haven’t anything new ...

API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP
The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches reveals that US companies could face losses ranging from $12. The post ...
Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia
SINGAPORE, July 25, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced their partnership with Infoline Tec Group Berhad, an established ...
What Comes After Your SIEM Purchase?
Let’s say you recently acquired a security information and event Management (SIEM) solution and have a new layer of defense in the war against cybercriminals. What comes next? Gaining Quick Time to ...
New Zenbleed Vulnerability: What It Is, How to Fix It
Zenbleed (CVE-2023-20593) was announced today. This is a vulnerability affecting AMD processors based on the Zen2 microarchitecture (certain EPYC CPUs used in datacenter servers and Ryzen/Threadripper CPUs used in desktop/laptop computers). The ...

IBM: Cost of a Data Breach Hits Another High
The average cost to an organization hit with a data breach reached a record high this year, though those companies are split on who they believe should foot the bill, according to ...
Security Boulevard

Lost transparency, blackbox ML, and other hidden risks of outsourced fraud solutions
Coby Montoya | | decision explainability, Digital Trust & Safety, Digital Trust and Safety, fraud solutions, ML, outsourced fraud solutions, payment fraud, Product, sift fraud solution, transparency
Machine learning-based fraud decision engines are sometimes viewed as mysterious black boxes that only provide minimal insight into why a decision was made on a login or a transaction. It’s a valid ...
BSides Leeds 2023 – BSides Leeds Orga – Opening Remarks
Marc Handelman | | appsec education, BSides Leeds, BSides Leeds 2023, cybersecurity education, education, Hardware Security, Infosecurity Education, Privacy, Regulatory Education, Risk Education, risk management, Security Architecture, Security BSides, Security Conferences, Security Education
Thanks are in order to BSides Leeds for publishing their presenter’s outstanding BSides Leeds 2023 security content on the organizations’ YouTube channel. Permalink ...