by Source Defense A recent incident at Blue Shield of California highlights the critical importance of client-side security controls when implementing third-party scripts on healthcare websites. The nonprofit health plan has disclosed a significant data breach affecting 4.7 million members,…
Tag: Security Boulevard
RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity
As enterprises brace for a new wave of stealthy intrusions — so-called Typhoon attacks — security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat…
ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a “massive security loophole” in the operating…
Data in Danger: Detecting Cross-Site Scripting in Grafana
Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform. The post Data in Danger: Detecting Cross-Site Scripting in Grafana appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Harness Adds Traceable WAAP to Secure Web Apps and APIs
Harness today unfurled a cloud web application and application programming interface (API) protection (WAAP) platform that makes it simpler for security operation (SecOps) teams to defend application environments. The post Harness Adds Traceable WAAP to Secure Web Apps and APIs…
HYCU Tackles SaaS Data Protection With New R-Shield Solution
HYCU introduces R-Shield to provide comprehensive cyber resilience across SaaS, cloud, and on-premises environments as organizations face growing supply chain attacks. The post HYCU Tackles SaaS Data Protection With New R-Shield Solution appeared first on Security Boulevard. This article has…
Beyond Backups: Building a Ransomware Response Playbook That Works
Organizations must avoid relying solely on traditional backups because ransomware attacks are occurring more often and becoming more expensive and complex. The post Beyond Backups: Building a Ransomware Response Playbook That Works appeared first on Security Boulevard. This article has…
GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets Detection
As cyber threats in healthcare continue to evolve, GitGuardian strengthens its commitment to the sector by joining Health-ISAC and offering members enhanced secrets detection capabilities to protect sensitive data. The post GitGuardian Joins Health-ISAC: Strengthening Cybersecurity in Healthcare Through Secrets…
Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact
Adversary-in-the-middle fraud (AiTM) represents a significant, ongoing challenge for businesses, with tactics like email hijacking, AI attacks and account takeovers becoming increasingly complex. The post Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact appeared first on Security Boulevard. This…
Why Smart Retrieval is Critical for Compliance Success
Let’s explore how four key elements can significantly improve how organizations find and use compliance documentation. The post Why Smart Retrieval is Critical for Compliance Success appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…