The shift to agentic AI isn’t just a technical challenge — it’s a leadership opportunity for CISOs to redefine their role from control enforcer to strategic enabler. The post The Rise of Agentic AI: A New Frontier for API Security…
Category: Security Boulevard
Rethinking API Security: Confronting the Rise of Business Logic Attacks (BLAs)
BLAs exploit the intended behavior of an API, abusing workflows, bypassing controls and manipulating transactions in ways that traditional security tools often miss entirely. The post Rethinking API Security: Confronting the Rise of Business Logic Attacks (BLAs) appeared first on…
API Use is Growing Fast, but Security is Lacking: Raidiam
A survey by UK company Raidiam found that even as the use of APIs continues to growth, most organizations have woefully inadequate protections in place to safeguard the increasingly sensitive data the APIs carry, exposing them up cyberattacks. The post…
Did This Retail Giant Pay a Ransom to Scattered Spider?
Moral hazard ahoy: M&S head Archie Norman won’t say if he authorized DragonForce ransomware hacker payday. The post Did This Retail Giant Pay a Ransom to Scattered Spider? appeared first on Security Boulevard. This article has been indexed from Security…
Reflectiz Joins the Datadog Marketplace
Boston, Massachusetts, 9th July 2025, CyberNewsWire The post Reflectiz Joins the Datadog Marketplace appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Reflectiz Joins the Datadog Marketplace
The 2025 Verizon Data Breach Report: A Wake-Up Call for MSPs
The data paints a clear picture: A full 20% of breaches this year stemmed from exploitation of known vulnerabilities, a 34% increase from last year. The post The 2025 Verizon Data Breach Report: A Wake-Up Call for MSPs appeared first on Security Boulevard. This…
What is Zero Data Retention and Why it May Be the Future of Secure Automation
Zero Data Retention offers a new path forward. One that enables intelligent automation, deep integrations and real-time workflows — without the baggage of persistent data storage The post What is Zero Data Retention and Why it May Be the Future…
Aviatrix to Build Security Fabric to Secure Cloud Computing Environments
Aviatrix today committed to building a security fabric that because it will run natively in cloud computing environments will enable cybersecurity teams to streamline workflows in a way that also promises to reduce total costs. The post Aviatrix to Build…
New Bert Ransomware Evolves With Multiple Variants
An emerging ransomware group that calls itself Bert is quickly evolving after hitting the cybercrime scene in April, targeting both Windows and Linux systems used by organizations in the health care, tech, and other industries in the United States, Europe,…
Chinese Hacker Linked to Silk Typhoon Charged With Stealing COVID Data
A 33-year-old Chinese national linked to the Silk Typhoon espionage group was arrested in Italy on a U.S. warrant that accuses him of conspiring with others in hacks of U.S. COVID-19 vaccine researchers and exploiting flaws in Microsoft Exchange Server…