Vulnerabilities

The Crucial Influence of Human Factors in Security Breaches
Prashant Ketkar | | breaches, Human Error, human factor, MFA, Phishing, remote browser isolation, Vulnerabilities, zero trust
The hard truth is that security breaches often happen because of human mistakes from simple, everyday actions. It's not just employees unknowingly using unsecured Wi-Fi – it's phishing, weak passwords and a ...
Security Boulevard

EPA IG Office: ‘High-Risk’ Security Flaws in Hundreds of Water Systems
Jeffrey Burt | | cyber attack on critical infrastructure, EPA, public water systems, Vulnerabilities
The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had "critical" or "high-risk" security flaws and another 211 had less dangerous vulnerabilities, risking threats from ...
Security Boulevard
IoT Security Failures Can Be Sh*tty
It’s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different. The Register reported that in Moscow a skyscraper-high plume of ...

Lottie Player compromised in supply chain attack — all you need to know
Popular JavaScript library and npm package Lottie Player was compromised in a supply chain attack with threat actors releasing three new versions of the component yesterday, all in a span of a ...
October Can Be Scary
Every October brings both Halloween and National Cybersecurity Awareness Month (NCSAM). Most people know about Halloween, but if you’re just coming up to speed on NCSAM here is some background. National Cybersecurity ...

Toxic Triad of Cloud Vulnerabilities Puts Businesses at Risk
Nathan Eddy | | Cloud, DEVOPS, Kubernetes, MFA, security, segmentation, Tenable, Vulnerabilities, zero trust
Publicly exposed, critically vulnerable and highly privileged workloads are putting organizations at risk of cloud data losses and cyberattacks, according to a Tenable report, which labeled the vulnerabilities a “toxic cloud triad” ...
Security Boulevard

Qualys Unfurls Risk Operations Center Platform
Qualys this week added a risk operations center (ROC) to its portfolio to make it simpler to identify potential threats to the business and centrally manage remediation efforts ...
Security Boulevard
Forget About Hurricanes, Enterprises Must Prepare for Typhoons
It’s hurricane season, and everyone knows what to expect and do. Install storm shutters, have extra food and supplies, backup generators, have flood insurance, and keep paying attention to upcoming forecasts. All ...
Training Your Team on the Security of CPS & IoT Systems
(Part 3 of our 3 part 2024 Summer IoT Security Series)After you’ve deployed and maintained security practices across IoT/CPS systems at scale comes having ongoing training and awareness building about security. It ...

Analysis Identifies Web Servers as Weakest Cybersecurity Link
An analysis of more than 39 million anonymized and normalized data points published today by Cycognito, a provider of platforms for discovering and testing attack surfaces, finds web servers accounted for more ...
Security Boulevard