Randall Munroe’s XKCD ‘Hot Water Balloon”
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Hot Water Balloon” appeared first on Security Boulevard.
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Hot Water Balloon” appeared first on Security Boulevard.
Alan speaks with Shailesh Athalye, senior vice president of product management at Qualys, about how AI, automation, and integrated platforms are redefining the way enterprises approach cybersecurity and risk management. Athalye notes that many organizations still operate in fragmented security environments—managing a patchwork of tools that generate endless alerts but little insight. The challenge, he..
The post From Visibility to Action: How AI and Automation Are Reshaping Enterprise Security appeared first on Security Boulevard.
Learn how GitGuardian supports expanding privileged access management to include non-human identities and improve secrets management across your infrastructure and vaults.
The post Working Towards Improved PAM: Widening The Scope And Taking Control appeared first on Security Boulevard.
Alan and Kip Boyle, founder and chief information security officer at Cyber Risk Opportunities, discuss how organizations can rethink cybersecurity in terms of measurable risk rather than endless checklists and compliance frameworks. Boyle, a longtime cybersecurity leader and author, argues that most organizations still treat cyber risk as a technical issue instead of a strategic..
The post Cyber Risk in Real Time: Lessons from the Front Lines appeared first on Security Boulevard.
SESSION Session 1C: Privacy & Usability 1
Authors, Creators & Presenters: Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania State University), Kanye Ye Wang (University of Macau)
PAPER Exploring User Perceptions of Security Auditing in the Web3 Ecosystem
In the rapidly evolving Web3 ecosystem, transparent auditing has emerged as a critical component for both applications and users. However, there is a significant gap in understanding how users perceive this new form of auditing and its implications for Web3 security. Utilizing a mixed-methods approach that incorporates a case study, user interviews, and social media data analysis, our study leverages a risk perception model to comprehensively explore Web3 users' perceptions regarding information accessibility, the role of auditing, and its influence on user behavior. Based on these extensive findings, we discuss how this open form of auditing is shaping the security of the Web3 ecosystem, identifying current challenges, and providing design implications.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.
The post NDSS 2025 – Exploring User Perceptions Of Security Auditing In The Web3 Ecosystem appeared first on Security Boulevard.
FCC Chair Brendan Carr said the agency will look to eliminate a declaratory ruling made by his predecessor that aimed to give the government more power to force carriers to strengthen the security of their networks in the wake of the widespread hacks by China nation-state threat group Salt Typhoon last year.
The post FCC Chair Carr Looks to Eliminate Telecom Cybersecurity Ruling appeared first on Security Boulevard.
Every healthcare CEO and CTO is asking the same question in 2025 and for 2026, “Can I trust what my AI just told me?” Artificial...Read More
The post Explainable & Trustworthy AI in Healthcare Analytics: How Blockchain and XAI Are Powering 2026’s Next Wave appeared first on ISHIR | Custom Software Development Dallas Texas.
The post Explainable & Trustworthy AI in Healthcare Analytics: How Blockchain and XAI Are Powering 2026’s Next Wave appeared first on Security Boulevard.
Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly. It starts with the headlines.
CTVNews: Ontario seniors GIVE AWAY MORE THAN $1 MILLION to scammers.
CTVNews: Ontario couple LOSES MORE THAN $1 MILLION DOLLARS to fraud.
Toronto Only: A couple ... LOST MORE THAN $1 MILLION
Daily Mail: Elderly couple transfer $1m to online scammers despite warning from bank
The tone of several of these stories, is victim shaming and leads with the wrong headline. They didn't "Give away" or "Lose" or "Transfer" these funds. They were STOLEN FROM THEM.
Illicit Call Centers: "Facebook Pop-Ups"One of the ways that we learn about how these scams play out is that we engage with scammers. I'm not a professional scam baiter or anything close to it, but it is a useful research tool. When I read the story of the Ontario couple, I knew exactly the type of script that was being followed, because I experienced it last month. Usually when I call an illicit call center on purpose, I am asked very quickly to give remote control of my computer to the scammers. But one day last month, the call followed a very different script than the primary ones to which I am accustomed. It started with a Facebook advertisement.
In the top right corner of my Facebook homepage, I had two advertisements displayed:
The goal of these advertisements is to make a less than wary Facebook user believe that they have unread messages that need to be attended to. I actually wrote a longer piece for LinkedIn about this type of advertisement about six months ago. See: "Dangerous Facebook Ads and Call Center Scams" on my LinkedIn page. In this case, the "vendor" who is providing the Facebook Ads portion of this scam is almost certainly operating from Vietnam. Crime is global. Who knew?
Clicking the ad, in the incident that I experience on October 17, 2025, led to exactly the same next steps as the ones I reported on April 24, 2025.
A fake "Facebook Suspended" page (hosted on web.core.windows[.]net)Whether you choose "Accept" or "Ignore" on this page, the next thing that happens is that your browser goes "Full Screen" and begins to play an audio warning on loop while displaying this Warning Page:
Mouse clicking is disabled while an audio warning tells us our Facebook account is going to be deleted if we don't call the indicated number immediately. I know that I can "Alt-F4" out of this message, but many users would not know how to do so.
According to our friends at URLScan.io, they have received reports of the "Facebook Suspended" intermediate page in the scam delivery using 933 different URLs, most recently, today. After a huge spike from November 2024 to January 2025, there has been a constant trickle of these nearly every day since ... often using Microsoft Azure nodes.
URLScan.io statistics on this page.Checking the Meta Ad Library, it is easy to see that a new round of these ads launched on October 29, 2025 (two days ago):
The new ads redirect through a slightly different intermediary page (I have an incoming call from a pretty girl) and then tell me that "Microsoft Care has temporarily disabled your Internet connection" and that I need to call or my "Facebook and Internet accounts will be permanently disabled."
new intermediary page new BSOD page as of 31OCT2025 Illicit Call Centers: Qualifying and "Recruiting" When I placed my call to the scammers on October 17th, I have to admit to being a bit inspired by "Scammer Payback" as I had recently written about his work in breaking up a $65 Million Crime Ring. I wrote about it in my post "Indian Call Center Scammers Partner with Chinese Money Launderers" on this blog. Following Pierogi's lead, I answered the scammers questions as if I were a retiree. (Don't let the grey beard fool you, I'm not!)The first thing the scammers had me do was to power off my computer. (I was playing an MP3 of their scam audio so they believed I was still on their "lock screen.")
They asked me "Is this your own computer? or a work computer?" I answered "Work computer? Heavens no! I haven't worked in years!" Then they asked me "Do you know what an IP address is?" I answered "No, I've never heard of an IT address, but my grandson works in IT ... is this related to him?" They gave me a very poor explanation of what an IP address is and then asked who my Internet carrier was. I lied and told them a carrier that doesn't even offer services in my area. They "put me on a brief hold" during which I could hear people talking in Hindi to one another. Then they came back and said "Yes, I see that your IP address is under investigation by (imaginary carrier)!"Then they asked me where I banked (I lied again) and whether I had an investment account (I lied again.) After putting me on another hold, they came back and said that my bank account was also under investigation. After a few minutes, they came back and said (in a very grave voice) that unfortunately, I was under suspicion for distributing "child pornography" (an obsolete and inappropriate term for Child Sexual Abuse Materials). Unfortunately, they had no choice but to turn this matter over to the FBI. Please hold as they were going to transfer me to the FBI Agent then.
As I denied having any involvement in CSAM materials, the FBI Agent very sternly yelled at me and asked me for my ZIP Code.
Unfortunately I had a meeting to attend about then, so I disengaged, but I know the rest of that script. The ZIP Code is so that they can look up the address of the nearest Bitcoin ATM from my house.
This is the BEGINNING of what happened to "the Ontario Couple" (only of course they were speaking to a Royal Canadian Mounted Police Agent, rather than an FBI Agent.)
We have assisted in several of these cases -- twice involving the elderly relatives of my own students -- who were convinced over the course of many phone calls over many days -- that they needed to withdraw their cash from the bank, and in one case, put the cash in an overnight delivery box and ship it to a CVS store in the Chicago area. Why would they do that? Because the FBI, convinced of their innocence, had asked their permission to use their bank account for a "sting" against a Mexican Drug Cartel. The "FBI Agent" in one case made them take an imaginary oath, similar to the oath one would take when being sworn into military service, that as part of the FBI's Undercover Operation, they were not allowed to speak to anyone about their secret mission. Doing so would result in them being arrested and charged with Obstruction of Justice. So when the bank says "Why are you withdrawing this money?" and they reply "Because I've decided to invest in Gold Bars" they are not "ignoring the warning of the bank" they are "following their orders as a sworn undercover agent assisting the FBI in breaking up a drug cartel!" In the Ontario couple's case, the psychological oppression and manipulation continued for FIVE MONTHS as they had their money slowly stolen by a TransNational Organized Crime group who has perfected the art of manipulation. And in that scenario, the Daily Mail and CTV want to broadcast that these fools gave their money away to criminals despite the bank's warning and they want YOU to believe that is what happened. Shame on them! Illicit Call Centers: Crime-As-A-Service (via Facebook)How do these types of crimes begin? To understand, it is necessary to start taking apart the illicit call center Crime-as-a-Service model that operates via Facebook Groups. We've been talking about these for nearly a decade now and they are more active now than ever before.
Here's an example of a scammer boasting that he offers calls on a "Pay Per Call" model for a variety of fraud types. Facebook, Blue Screen of Death, Amazon, and PayPal. His point in sharing the Call Duration is to indicate that his calls are "sticky." That is, they are likely to have a long enough conversation to "sink the hook." Calls from 1308 seconds (21 minutes) to 4765 seconds (79 minutes!) are likely to have been believable enough that there is time to have taken the scam to a financially rewarding level.
"Sounds" posted their advertisements in groups such as:
And of course as we have already mentioned, the Chinese Money Laundering Organizations are now offering their services inside the Indian Call Center CaaS Facebook groups as well ... (+852 = Hong Kong)
"Kevin" is in the Facebook groups that are more dedicated to the money laundering side of these transnational organized crime operations. Groups like:
"Norman Mike" was advertising an Indian telephone number despite attending the University of Johannesburg, living in London, and having an American flag as their cover image.
https://www.facebook.com/norman.mike.7528/I'll be sure to post an update on what happens when we suggest to Facebook that Norman Mike may be a fake account!
Illicit Call Centers: STOP BLAMING THE VICTIM! In this Crime-as-a-Service Infrastructure, criminals like the Vietnamese programmers who place the Facebook ads work with Indian "Lead Generators" who promise to send "Facebook Pay Per Call" telephone calls from potential victims to Illicit call centers in India and Pakistan, who use Pakistani-provided Toll Free Numbers to make connection, and then use Chinese Money Laundering Organizations to pick up their cash, could we agree that perhaps things are a bit more complicated than our average Ontario pensioner is able to tackle by themselves? When the Illicit Call Center's scripts and practices qualify the victim as an elderly high wealth pensioner and they are "recruited by the FBI or RCMP" it is entirely insufficient for the bank to say "Sir, this may be a scam" and then boast to the media how they provided an adequate warning!The post Transnational Organized Crime Gang Steals $1 Million from Ontario Couple appeared first on Security Boulevard.
Learn about enterprise vulnerability management, its components, challenges, and best practices for Enterprise SSO, Enterprise Ready, and CIAM environments. Enhance your organization's security posture.
The post Enterprise Vulnerability Management: A Comprehensive Guide appeared first on Security Boulevard.
Announcing the Fabricate Data Agent, synthetic data generation via agentic AI. Plus, Structural's Custom Categorical is now AI-assisted, and Model-based Custom Entities are coming to Textual!
The post Tonic.ai product updates: October 2025 appeared first on Security Boulevard.
Many organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks.
Key takeawaysIn case you missed it, here’s fresh guidance from recent months on how organizations can manage, govern, and prep for the new wave of AI cyber risks.
1 - Tenable report: The “act now, secure later” AI problemMost organizations have taken a cavalier attitude towards their use of artificial intelligence (AI) and cloud, a bit along the lines of: “Don’t worry, be happy.”
In other words: Use AI and cloud now, deal with security later. Of course, this puts them in a precarious position to manage their cyber risk.
This is the dangerous scenario that emerges from the new Tenable report “The State of Cloud and AI Security 2025,” published in September.
“Most organizations already operate in hybrid and multi-cloud environments, and over half are using AI for business-critical workloads,” reads the global study, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance.
“While infrastructure and innovation have evolved rapidly, security strategy has not kept pace,” it adds.
Based on a survey of 1,025 IT and security professionals, the report found 82% of organizations have hybrid – on-prem and cloud – environments and 63% use two or more cloud providers.
Meanwhile, organizations are jumping into the AI pond headfirst: 55% are using AI and 34% are testing it. The kicker? About a third of those using AI have suffered an AI-related breach.
“The report confirms what we’re seeing every day in the field. AI workloads are reshaping cloud environments, introducing new risks that traditional tools weren’t built to handle," Liat Hayun, VP of Product and Research at Tenable, said in a statement.
Key obstacles to effectively secure AI systems and cloud environments include:
The fix? Shift from a reactive to a proactive approach. To stay ahead of evolving threats:
To get more details, check out:
For more information about cloud security and AI security, check out these Tenable resources:
AI risk isn't just an IT problem anymore. It's a C-suite and boardroom concern as well.
The sign? Fortune 100 boards of directors have boosted the number and the substance of their AI and cybersecurity oversight disclosures.
That’s the headline from an EY analysis of proxy statements and 10-K filings submitted to the U.S. Securities and Exchange Commission (SEC) by 80 of the Fortune 100 companies in recent years.
“Companies are putting the spotlight on their technology governance, signaling an increasing emphasis on cyber and AI oversight to stakeholders,” reads the EY report “Cyber and AI oversight disclosures: what companies shared in 2025,” published in October.
What’s driving this trend? Cyber threats are getting smarter by the minute, while the use of generative AI, both by security teams and by attackers, is growing exponentially.
Key findings on AI oversight include:
“Board oversight of these areas is critical to identifying and mitigating risks that may pose a significant threat to the company,” reads the report.
For more information about AI governance in the boardroom and the C-suite:
Now that the C-level executives and the board are paying attention, organizations need an AI game plan. A new Cloud Security Alliance AI playbook might be useful in this area.
The CSA’s “Artificial Intelligence Controls Matrix,” published in July, is described as a vendor-agnostic framework for developing, deploying, and running AI systems securely and responsibly.
“The AI Controls Matrix bridges the gap between lofty ethical guidelines and real-world implementation. It enables all stakeholders in the AI value chain to align on their roles and responsibilities and measurably reduce risk,” Jim Reavis, CSA CEO and co-founder, said in a statement.
The matrix maps to cybersecurity standards such as ISO 42001 and the National Institute of Standards and Technology’s “Artificial Intelligence Risk Management Framework” (NIST AI 600-1).
It features 243 AI security controls across 18 domains, including:
For example, the “application and interface security” domain includes controls for secure development, testing, input and output validation, and API security. Meanwhile, the “threat and vulnerability management” domain covers penetration testing, remediation, prioritization, reporting and metrics, and threat analysis and modeling.
For more information about AI data security, check out these Tenable resources:
Once you’ve adopted an AI security playbook, use it.
As IBM’s “Cost of a Data Breach Report 2025” found, companies are paying a pretty penny when they roll out AI systems without the proper usage governance and security controls.
“This year's results show that organizations are bypassing security and governance for AI in favor of do-it-now AI adoption. Ungoverned systems are more likely to be breached—and more costly when they are,” reads an IBM statement.
Check the stats:
The report, released in July, also calls out shadow AI – the unapproved use of AI by employees. This practice caused a breach at 20% of organizations.
And companies with high shadow AI rates experienced higher data breach costs and more compromised personal information and intellectual property.
In short: Cyber attackers are exploiting the lack of basic AI access controls and AI governance.
Impacts of security incidents on authorized AI
(From organizations that reported a security incident involving an AI model or application; more than one response permitted. Source: IBM’s “Cost of a Data Breach Report 2025,” July 2025)
The report is based on analysis of data breaches at 600 organizations. Almost 3,500 security and C-level executives were interviewed.
To get more details, check out:
For more information about shadow AI, check out these Tenable resources:
Lack of governance isn't just a high-level policy failure. It's happening at every desk.
Just how bad is the AI security situation at the user level? Check out these stats:
Those numbers come from the report “Oh, Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2025-2026,” which the National Cybersecurity Alliance (NCA) and CybSafe published in October, based on a survey of 7,000-plus respondents from Australia, Brazil, Germany, India, Mexico, the U.K., and the U.S.
“The rapid rise in AI usage is the double-edged sword to end all double-edged swords: while it boosts productivity, it also opens up new and urgent security risks, particularly as employees share sensitive data without proper oversight,” reads the report.
And it’s not like people are clueless. They worry about AI super-charging scams and cyber crime (63%), fake info (67%), security system bypassing (67%) and identity impersonation (65%). Yet, respondents’ faith in companies adopting AI responsibly and securely is only 45%.
In fact, the report states that shadow AI is “here to stay” and “becoming the new norm,” due to insufficient AI security awareness training.
“Without urgent action to close this gap, millions are at risk of falling victim to AI-enabled scams, impersonation, and data breaches,” Lisa Plaggemier, Executive Director of the NCA, said in a statement.
To learn more about AI security awareness training:
All of these AI challenges have a silver lining for cybersecurity professionals with AI security skills.
That’s the word from Robert Half’s “2026 Salary Guide,” published in October. If you know how to use AI for things like managing vulnerabilities, automating security, or hunting for threats, you're going to be "highly sought."
“Many employers look for candidates who can work with AI programs or models, such as neural networks and natural language processing, for predicting and mitigating cyber risks,” Robert Half wrote in an article about the guide titled “What to Know About Hiring and Salary Trends in Cybersecurity.”
Cyber hiring managers are also eager for candidates with AI-related certifications, like Microsoft’s AI-900 and Google Cloud’s Machine Learning Engineer.
Of course, other skills still shine:
To get more details, check out:
The post Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness appeared first on Security Boulevard.
Cyber risk assessment is the heart of modern cyber risk management. In 2025, as enterprises face AI-driven attacks, record ransomware volumes, and regulators demanding operational resilience, the ability to assess cyber risks in business and financial terms has become mission-critical.
The post The Top 8 Cyber Risk Assessment Tools and Solutions appeared first on Security Boulevard.
Simulators don’t just teach pilots how to fly the plane; they also teach judgment. When do you escalate? When do you hand off to air traffic control? When do you abort the mission? These are human decisions, trained under pressure, and just as critical as the technical flying itself.
The post Flight Simulators for AI Agents — Practicing the Human-in-the-Loop appeared first on Strata.io.
The post Flight Simulators for AI Agents — Practicing the Human-in-the-Loop appeared first on Security Boulevard.
Pilots don’t just train in simulators; they log hours and earn licenses. A private pilot needs a minimum number of simulator sessions before solo flight. Commercial pilots need even more. The process is standardized, measurable, and required.
The post Building an AI Pilot’s License — From Sandbox Hours to Production Readiness appeared first on Strata.io.
The post Building an AI Pilot’s License — From Sandbox Hours to Production Readiness appeared first on Security Boulevard.
Enterprises adopting agentic AI face their own black swans. Identity outages, token replay attacks, or rogue agents don’t happen every day, but when they do, the impact is massive and immediate. The problem is that most organizations still rely on unit tests, integration tests, or static code reviews.
The post Training for the Unexpected — Why Identity Simulation Matters More Than Unit Tests appeared first on Strata.io.
The post Training for the Unexpected — Why Identity Simulation Matters More Than Unit Tests appeared first on Security Boulevard.
How Can Effective NHI Management Transform Your Cybersecurity Strategy? How can organizations efficiently manage secrets and non-human identities (NHIs) while maintaining a budget-friendly approach? This question is particularly vital for industries like financial services, healthcare, and more, where both budget constraints and stringent security requirements exist. Exploring cost-effective secrets management, along with NHI management, provides […]
The post Secrets Management That Fits Your Budget appeared first on Entro.
The post Secrets Management That Fits Your Budget appeared first on Security Boulevard.
Are You Really Satisfied with Your Secrets Vaulting Approach? How confident are you in your current secrets vaulting strategies? Where organizations increasingly rely on digital processes, the management of Non-Human Identities (NHIs) and their secrets becomes critical to maintaining security and compliance. For sectors such as financial services, healthcare, and DevOps, ensuring that machine identities […]
The post Satisfied with Your Secrets Vaulting Approach? appeared first on Entro.
The post Satisfied with Your Secrets Vaulting Approach? appeared first on Security Boulevard.
What is the True Cost of Overlooking Non-Human Identities? When organizations increasingly move operations to the cloud, the spotlight is now on securing machine identities, also known as Non-Human Identities (NHIs). But what happens when these identities are overlooked? The risks extend far beyond hypothetical breaches and can shake the very foundation of operational security. […]
The post Improving NHI Lifecycle Management Continuously appeared first on Entro.
The post Improving NHI Lifecycle Management Continuously appeared first on Security Boulevard.
How Secure Are Your Cloud-Based Non-Human Identities? What measures are you taking to ensure the security of your cloud-based systems? Managing Non-Human Identities (NHIs) has become a critical focus for diverse sectors, including financial services, healthcare, and travel. NHIs, essentially machine identities, are pivotal to maintaining a robust cybersecurity posture, yet they often remain overlooked. […]
The post Independent Control Over Cloud Identities appeared first on Entro.
The post Independent Control Over Cloud Identities appeared first on Security Boulevard.
OpenAI on Thursday launched Aardvark, an artificial intelligence (AI) agent designed to autonomously detect and help fix security vulnerabilities in software code, offering defenders a potentially valuable tool against malicious hackers. The GPT-5-powered tool, currently in private beta, represents what OpenAI calls a “defender-first model” that continuously monitors code repositories to identify vulnerabilities as software..
The post OpenAI’s Aardvark is an AI Security Agent Combating Code Vulnerabilities appeared first on Security Boulevard.