❌

Normal view

Received yesterday β€” 12 December 2025
Received before yesterday

Undetected Firefox WebAssembly Flaw Put 180 Million Users at Risk

2 December 2025 at 13:30
AI, risk, IT/OT, security, catastrophic, cyber risk, catastrophe, AI risk managed detection and response

Cybersecurity startup Aisle discovered a subtle but dangerous coding error in a Firefox WebAssembly implementation sat undetected for six months despite being shipped with a regression testing capability created by Mozilla to find such a problem.

The post Undetected Firefox WebAssembly Flaw Put 180 Million Users at Risk appeared first on Security Boulevard.

The Latest Shai-Hulud Malware is Faster and More Dangerous

25 November 2025 at 16:17
supply chains, audits, configuration drift, security, supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

A new iteration of the Shai-Hulud malware that ran through npm repositories in September is faster, more dangerous, and more destructive, creating huge numbers of malicious repositories, compromised scripts, and GitHub users attacked, creating one of the most significant supply chain attacks this year.

The post The Latest Shai-Hulud Malware is Faster and More Dangerous appeared first on Security Boulevard.

OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take Center Stage

24 November 2025 at 10:00

Discover what’s changed in the OWASP 2025 Top 10 and how GitGuardian helps you mitigate risks like broken access control and software supply chain failures.

The post OWASP Top 10 2025 Updates: Supply Chain, Secrets, And Misconfigurations Take Center Stage appeared first on Security Boulevard.

An Overview of Qualified Digital Certificates

Explore qualified digital certificates, their role in authentication, and how they bolster security in software development. Understand the technical and legal aspects.

The post An Overview of Qualified Digital Certificates appeared first on Security Boulevard.

Defense in Depth for AI: The MCP Security Architecture You’re Missing

3 November 2025 at 15:46

As AI agents become integral to cloud native applications, the Model Context Protocol (MCP) has emerged as a leading standard for enabling these agents to interact with external tools and data sources. But with this new architectural pattern comes a critical security challenge: MCP-based systems require protection at three distinct layers, not just one. The..

The post Defense in Depth for AI: The MCP Security Architecture You’re Missing appeared first on Security Boulevard.

The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM

Twilio acquiring Stytch signals a major shift in developer CIAM. I've analyzed 20+ platformsβ€”from Descope to Keyclockβ€”to show you which deliver on Auth0's promise without the lock-in. OpenID standards, AI agent auth, and what actually matters when choosing your identity platform.

The post The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM appeared first on Security Boulevard.

Threat Actors Weaponizing Open Source AdaptixC2 Tied to Russian Underworld

30 October 2025 at 09:39
Israel, hacktivist, Iran, hacker, hacking, hackers,

AdaptixC2, a legitimate and open red team tool used to assess an organization's security, is being repurposed by threat actors for use in their malicious campaigns. Threat researchers with Silent Push have linked the abuse of the technology back to a Russian-speaking bad actor who calls himself "RalfHacker."

The post Threat Actors Weaponizing Open Source AdaptixC2 Tied to Russian Underworld appeared first on Security Boulevard.

❌