Output-driven SIEM — 13 years later Output-driven SIEM! Apart from EDR and SOC visibility triad, this is probably my most known “invention” even though I was very clear that I stole this from the Vigilant crew back in 2011. Anyhow, I asked this question…
Category: Security Boulevard
Randall Munroe’s XKCD ‘Alert Sound’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/3100/” target=”_blank”> <img alt=”” height=”455″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/d5aefbbd-9910-443b-975e-0094443a75fe/alert_sound.png?format=1000w” width=”393″ /> </a><figcaption class=”image-caption-wrapper”> via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Alert Sound’ appeared first on Security Boulevard.…
LinuxFest Northwest: Code-By-Mail: A Rough And Tumble Guide To Submitting To Mailing Lists
Authors/Presenters: Sen Hastings (Software Dev And SBC Enthusiast) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events…
LinuxFest Northwest: Beyond ARIA Labels What A Blind Film Enthusiast Can Teach Us About Open Source
Authors/Presenters: José Ibañez (CEO at Blind Penguin), Raissa Ibañez (Manager At Blind Penguin) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content.…
Automated Guard Rails for Vibe Coding
Vibe coding might sound like a trendy term, but it’s really just developing software without automated checks and quality gates. Traditional engineering disciplines have always relied on safety measures and quality controls, so vibe coding should be no different in…
App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems
In 2025, app store security threats have reached unprecedented levels, driven by increasingly sophisticated cybercriminal tactics and expanding attack surfaces. The post App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems appeared first on Security Boulevard. This article…
Washington Post Journalists’ Microsoft Email Accounts Hacked
The Microsoft email accounts of several Washington Post journalists whose coverage includes national security and economic policy, including China, where hacked and could give the bad actors access to the messages that were sent and received. The post Washington Post…
GUEST ESSAY: The AI illusion: Don’t be fooled, innovation without guardrails is just risk–at scale
Artificial intelligence is changing everything – from how we search for answers to how we decide who gets hired, flagged, diagnosed, or denied. Related: Does AI take your data? It offers speed and precision at unprecedented scale. But without intention,…
Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran Nuclear Sites
The cyber domain is a primary theater in the Israel-Iran conflict. Organizations across Israel must be aware and brace for a wave of sophisticated and ideologically driven cyberattacks. The post Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran…
Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life…