Everything Cybereason at the Black Hat 2021 Virtual Conference

The Cybereason team is excited to have you join us at Black Hat 2021 on August 4th from 8:30AM to 5PM PST, and on August 5th from 8:30AM to 4PM PST! Stop by the “virtual” Cybereason booth and automatically be entered to win a Sonos Roam Speaker an… Continue reading Everything Cybereason at the Black Hat 2021 Virtual Conference

Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Yet another zero-day bug in iOS has allowed notorious spyware vendor NSO Group to break into the iPhones of journalists and activists.
The post Apple’s Insecure iPhone Lets NSO Hack Journalists (Again) appeared first on Security Boulevard.
Continue reading Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Cybereason Enhances XDR Offering with empow Acquisition

Today’s targeted attacks increasingly take aim at multiple devices and users simultaneously while employing a range of tactics, techniques and procedures (TTPs). To further complicate the work of the defender, traditional security solutions are al… Continue reading Cybereason Enhances XDR Offering with empow Acquisition

WHAT IS A SIEM, AND WHY SHOULD YOU HAVE ONE?

SIEM (pronounced like “sim” from “simulation”), which stands for Security Information and Event Management, was conceived of as primarily a log aggregation device. However, a SIEM’s primary capabilities are to provide threat detection, better enable in… Continue reading WHAT IS A SIEM, AND WHY SHOULD YOU HAVE ONE?

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change.
The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Continue reading Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

Threat Modeling in the Age of Automation

Cybersecurity threats are rising fast, leading enterprises that build applications to look more closely at security measures built on precautionary principles, including threat modeling, which has become core to ensuring applications can withstand fut… Continue reading Threat Modeling in the Age of Automation

Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

Apple’s under fire yet again for iOS security bugs in WebKit—the code behind the Safari browser.
The post Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets appeared first on Security Boulevard.
Continue reading Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

Salt Security Report Highlights Prevalence of API Vulnerabilities

Salt Security, a provider of a platform for securing application programming interfaces (APIs), today published a report that reveals the existence of vulnerabilities in APIs in an unidentified platform employed widely in the financial services indust… Continue reading Salt Security Report Highlights Prevalence of API Vulnerabilities

Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Amazon’s Ring unit is moving ahead with plans to allow end-to-end encryption (E2EE).
The post Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch appeared first on Security Boulevard.
Continue reading Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch