AI Offers Critical Assist to Incident Response

The security skills gap has limited what companies are able to do when it comes to incident investigation and response. And it isn’t just the lack of cybersecurity talent available to hire; security analysts already on staff may not have the specializ… Continue reading AI Offers Critical Assist to Incident Response

Grandchild of Rowhammer: ‘Half-Double’ Tactic Flips Farther Bits

Rowhammer has a new variant. And it’s been made easier: DDR4 memory is getting denser, so the individual bits are physically closer together.
The post Grandchild of Rowhammer: ‘Half-Double’ Tactic Flips Farther Bits appeared first on Security Boulevar… Continue reading Grandchild of Rowhammer: ‘Half-Double’ Tactic Flips Farther Bits

SolarWinds Hackers Targeting Government Agencies Via Email

Threat actor Nobeliumm, the state-backed Russian group of cybercriminals behind last year’s SolarWinds hacking campaign, has launched a new attack targeting government agencies, think tanks, consultants and non-governmental organizations, according to… Continue reading SolarWinds Hackers Targeting Government Agencies Via Email

Experian API Leaked Credit Scores

After Experian fixed a weakness at a partner website that let anyone view credit scores for nearly every American by just inputting a name and address, questions remain about whether the same problem exists with other partners, and how widespread the … Continue reading Experian API Leaked Credit Scores

Specter of Spectre is Back, in New Micro-Op Cache Vuln

It’s been three years, but now researchers have disclosed new attacks on speculative execution in Intel and AMD chips.
The post Specter of Spectre is Back, in New Micro-Op Cache Vuln appeared first on Security Boulevard.
Continue reading Specter of Spectre is Back, in New Micro-Op Cache Vuln

How to Solve the Cybersecurity Skills Gap

Understanding how to bridge the talent gap in the cybersecurity industry requires thinking beyond traditional approaches to recruiting. While there’s been progress, there is still room for organizations to evolve, which will require not only changing … Continue reading How to Solve the Cybersecurity Skills Gap

Understanding EtterSilent and the Cybercrime Supply Chain

The buzz around a new maldoc builder that’s quickly becoming the favorite of cybercriminals mirrors the behavior around other popular products in a legitimate marketplace – that could be good news for defenders. Just like buyers who line up to b… Continue reading Understanding EtterSilent and the Cybercrime Supply Chain