securityboulevard.com Open in urlscan Pro
2606:4700:10::ac43:f6b  Public Scan

Submitted URL: https://securityboulevard.com.mcas-gov.us/
Effective URL: https://securityboulevard.com/
Submission: On December 15 via automatic, source certstream-suspicious — Scanned from US

Form analysis 2 forms found in the DOM

GET https://securityboulevard.com/

<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
  <div class="search-wrap">
    <input type="text" placeholder="Search" class="s field" name="s">
    <button class="search-icon" type="submit"></button>
  </div>
</form>

POST /

<form method="post" enctype="multipart/form-data" id="gform_10" action="/">
  <div class="gform_body gform-body">
    <ul id="gform_fields_10" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_10_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_1">Email<span class="gfield_required"><span
              class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_1" id="input_10_1" type="text" value="" class="large" placeholder="Your Email" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_10_2" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="gsection_description"><a href="https://securityboulevard.com/privacy-policy/">View Security Boulevard <u>Privacy Policy</u></a></div>
      </li>
      <li id="field_10_3" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_3" id="input_10_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_10_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_10_5" class="gfield gfield--width-full field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_5">CAPTCHA</label>
        <div id="input_10_5" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn&amp;co=aHR0cHM6Ly9zZWN1cml0eWJvdWxldmFyZC5jb206NDQz&amp;hl=en&amp;v=VZKEDW9wslPbEc9RmzMqaOAP&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=p9nv9oep3rf1"
                width="256" height="60" role="presentation" name="a-njldknk8yrku" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div>
        </div>
      </li>
      <li id="field_10_6" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_10_6">Comments</label>
        <div class="ginput_container"><input name="input_6" id="input_10_6" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_10_6">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_10" class="gform_button button" value="Subscribe Now"
      onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_10&quot;]){return false;}  window[&quot;gf_submitting_10&quot;]=true;  "
      onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_10&quot;]){return false;} window[&quot;gf_submitting_10&quot;]=true;  jQuery(&quot;#gform_10&quot;).trigger(&quot;submit&quot;,[true]); }">
    <input type="hidden" class="gform_hidden" name="is_submit_10" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="10">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_10" value="WyJbXSIsImExN2ZmNzMxNzRmOWUyZjU4NDM0NzI5MzVhYzMzZjI2Il0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_10" id="gform_target_page_number_10" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_10" id="gform_source_page_number_10" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js" name="ak_js" value="1639583137145"></p>
</form>

Text Content

Wednesday, December 15, 2021
 * Capturing your screenshots with Foresight in Action
 * Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)
 * Log4Shell: The New Zero-Day Vulnerability in Log4j
 * Security with QoS Optimization in IoT
 * How to Determine if Your Network Security is Working

 * 
 * 
 * 
 * 
 * 
 * 
 * 


SECURITY BOULEVARD

The Home of the Security Bloggers Network


Community Chats Webinars Library


 * Home
   * Cybersecurity News
   * Features
   * Industry Spotlight
   * News Releases
 * Security Bloggers Network
   * Latest Posts
   * Contributors
   * Syndicate Your Blog
   * Write for Security Boulevard
 * Events
   * Upcoming Events
   * Upcoming Webinars
   * On-Demand Events
   * On-Demand Webinars
 * Chat
   * Security Boulevard Chat
   * Marketing InSecurity Podcast
 * Library
 * Related Sites
   * Techstrong Group
   * Container Journal
   * DevOps.com
   * Security Boulevard
   * Techstrong Research
   * Techstrong TV
   * Devops Chat
   * DevOps Dozen
   * DevOps TV
   * Digital Anarchist
 * Media Kit
 * About Us



 * Analytics
 * AppSec
 * CISO
 * Cloud
 * DevOps
 * GRC
 * Identity
 * Incident Response
 * IoT / ICS
 * Threats / Breaches
 * More
   * Blockchain / Digital Currencies
   * Careers
   * Cyberlaw
   * Mobile
   * Social Engineering
 * Humor



WHEN NOT TO TRUST ZERO-TRUST

Dec 15 | Sue Poremba

KRONOS SENDS CLIENTS ELSEWHERE AFTER RANSOMWARE ATTACK

Dec 14 | Teri Robinson

HERE WE GO AGAIN: SECOND LOG4J FLAW SURFACES

Dec 14 | Teri Robinson

APPLE AIRTAG ANDROID APP IS ABSOLUTELY AWFUL—TRACKER DETECT FAIL

Dec 14 | Richi Jennings

TELEPORT ADDS WINDOWS SUPPORT TO INFRASTRUCTURE SECURITY GATEWAY

Dec 14 | Michael Vizard


TOPIC SPOTLIGHT: BEST OF 2021


APPLE AIRTAG ANDROID APP IS ABSOLUTELY AWFUL—TRACKER DETECT FAIL

December 14, 2021 | Richi Jennings


CYBEREASON MAKES LOG4SHELL ‘VACCINE’ AVAILABLE

December 13, 2021 | Michael Vizard


UPDATE: LOG4SHELL RCE ZERO-DAY—REACTIONS AND RECRIMINATIONS

December 13, 2021 | Richi Jennings


ANALYTICS AND INTELLIGENCE

Cybersecurity Featured Network Security Security Boulevard (Original) Threat
Intelligence 


HOW TO DETERMINE IF YOUR NETWORK SECURITY IS WORKING

December 15, 2021 Dec 15 | John Bruggeman 0

Cybersecurity Data Security Endpoint Featured Incident Response Malware Network
Security Security Boulevard (Original) Spotlight Threat Intelligence Threats &
Breaches Vulnerabilities 


KRONOS SENDS CLIENTS ELSEWHERE AFTER RANSOMWARE ATTACK

December 14, 2021 Dec 14 | Teri Robinson 0
Application Security Cybersecurity Featured Incident
Response Malware News Security Awareness Security Boulevard
(Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 


HERE WE GO AGAIN: SECOND LOG4J FLAW SURFACES

December 14, 2021 Dec 14 | Teri Robinson 0
More Analytics and Intelligence


APPLICATION SECURITY

Application Security Cloud Security Cybersecurity Data
Security Endpoint Featured Governance, Risk & Compliance Identity &
Access Network Security Security Boulevard (Original) Spotlight 


WHEN NOT TO TRUST ZERO-TRUST

December 15, 2021 Dec 15 | Sue Poremba 0

Analytics & Intelligence Application Security Best of 2021 Cloud
Security Cyberlaw Cybersecurity Editorial Calendar Featured Governance, Risk &
Compliance Identity & Access IoT & ICS Security Mobile Security Most Read This
Week News Security Awareness Security Boulevard (Original) Social
Engineering Spotlight Threat Intelligence Threats & Breaches 


APPLE AIRTAG ANDROID APP IS ABSOLUTELY AWFUL—TRACKER DETECT FAIL

December 14, 2021 Dec 14 | Richi Jennings 0
Application Security Security Bloggers Network Vulnerabilities 


CYBERATTACKS IN 2022 WILL LOOK FAMILIAR

December 14, 2021 Dec 14 | Andrew Useckas 0
More Application Security


CISO

CISO Suite Data Security Security Bloggers Network Threats & Breaches 


LOG4J 2 – BEYOND PATCHING: WHAT’S NEXT?

December 14, 2021 Dec 14 | Jeff Moncrief 0

CISO Suite Security Bloggers Network 


CYBEREASON TAPS FORMER DYSON CISO CK CHIM AS FIELD CSO TO SUPPORT APAC EXPANSION

December 8, 2021 Dec 8 | Cybereason Security Team 0
Best of 2021 CISO Suite Cybersecurity Editorial Calendar Featured Identity &
Access Incident Response Security Awareness Security Boulevard
(Original) Spotlight Threat Intelligence 


IT’S NOT A USER PROBLEM; IT’S A CYBERSECURITY PEOPLE PROBLEM

December 8, 2021 Dec 8 | Sue Poremba 0
More CISO


CLOUD SECURITY

Cloud Security Cybersecurity Featured Identity & Access IoT & ICS
Security News Security Awareness Security Boulevard
(Original) Spotlight Vulnerabilities 


TELEPORT ADDS WINDOWS SUPPORT TO INFRASTRUCTURE SECURITY GATEWAY

December 14, 2021 Dec 14 | Michael Vizard 0

Cloud Security Cybersecurity Data Security Governance, Risk &
Compliance Incident Response Security Boulevard (Original) Vulnerabilities 


SUPPLY CHAIN ATTACKS AND CYBERINSURANCE

December 14, 2021 Dec 14 | Eran Orzel 0
Application Security Cloud Security Cybersecurity Data Security Identity &
Access Malware Security Boulevard (Original) Threat Intelligence 


PREPARING FOR EVOLVING PHISHING SCAMS

December 14, 2021 Dec 14 | Manoj Srivastava 0
More Cloud Security


DEVOPS SECURITY

DevOps Security Bloggers Network 


CAPTURING YOUR SCREENSHOTS WITH FORESIGHT IN ACTION

December 15, 2021 Dec 15 | Serkan Korkut 0

DevOps Security Bloggers Network Vulnerabilities 


LOG4SHELL VULNERABILITY: WHAT SECURITY OPERATIONS TEAMS NEED TO KNOW NOW AND HOW
SOAR CAN HELP YOU DETECT AND RESPOND

December 14, 2021 Dec 14 | Dan Kaplan 0
DevOps Security Bloggers Network 


SCALING TO SCALA

December 13, 2021 Dec 13 | Erik Costlow, Principal Product Evangelist 0
More DevOps Security


INCIDENT RESPONSE

Application Security Best of 2021 Cybersecurity Editorial
Calendar Featured Incident Response Malware News Security Awareness Security
Boulevard (Original) Spotlight Threat Intelligence Threats &
Breaches Vulnerabilities 


CYBEREASON MAKES LOG4SHELL ‘VACCINE’ AVAILABLE

December 13, 2021 Dec 13 | Michael Vizard 0

Analytics & Intelligence Application Security Best of 2021 Cloud
Security Cybersecurity Data Security DevOps Editorial Calendar Featured Incident
Response Malware Network Security News Popular Post Security Awareness Security
Boulevard (Original) Spotlight Threat Intelligence Threats &
Breaches Vulnerabilities 


UPDATE: LOG4SHELL RCE ZERO-DAY—REACTIONS AND RECRIMINATIONS

December 13, 2021 Dec 13 | Richi Jennings 0
Application Security Cloud Security Cybersecurity Data Security Incident
Response Malware Network Security Security Awareness Security Boulevard
(Original) 


HOW CYBERSECURITY AWARENESS SHIFTED IN 2021

December 13, 2021 Dec 13 | Darren Guccione 0
More Incident Response


IOT & ICS SECURITY

Cloud Security Cybersecurity Data Security Endpoint IoT & ICS Security Mobile
Security Network Security Security Boulevard (Original) 


HOW SASE ENABLES AND SECURES 5G NETWORKS

December 13, 2021 Dec 13 | Michael Wood 0

Cloud Security Cybersecurity Data Security Featured IoT & ICS Security Network
Security News Security Awareness Security Boulevard (Original) Spotlight 


CISCO SURVEY SURFACES LEGACY INFRASTRUCTURE SECURITY CHALLENGES

December 7, 2021 Dec 7 | Michael Vizard 0
Analytics & Intelligence Cloud Security Cybersecurity Data
Security Endpoint Featured Identity & Access Incident Response IoT & ICS
Security Malware Network Security News Security Boulevard
(Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 


HOME ROUTERS ARE FULL OF SECURITY BUGS—PATCH NOW

December 6, 2021 Dec 6 | Richi Jennings 0
More IoT & ICS Security


THREATS AND BREACHES

Security Bloggers Network Vulnerabilities 


LOG4SHELL: THE NEW ZERO-DAY VULNERABILITY IN LOG4J

December 15, 2021 Dec 15 | Kumar Shantanu Shantanu 0

Security Bloggers Network Vulnerabilities 


BROAD EXPOSURE TO LOG4SHELL CVE-2021-44228 HIGHLIGHTS HOW THE ATTACK SURFACE HAS
EXPLODED

December 14, 2021 Dec 14 | Vinay Sridhara 0
Security Bloggers Network Vulnerabilities 


LOG4J VULNERABILITY: THE PERFECT HOLIDAY PRESENT THAT NOBODY WANTS

December 14, 2021 Dec 14 | Ben Martin 0
More Threats and Breaches


INDUSTRY SPOTLIGHT

Careers Cyberlaw Cybersecurity Governance, Risk & Compliance Industry
Spotlight Security Boulevard (Original) Threat Intelligence 


WHY PUBLIC-PRIVATE PARTNERSHIP IS KEY TO CYBERSECURITY

December 8, 2021 Dec 8 | Luke Tenery 0

The federal government is currently handicapped in a way it has not experienced
before. Because the digital domain is man-made, governments around the world
have different levels of access and freedom of movement within it. In western
democracies, the vast majority of the digital domain is privately held and,
thus, outside of the direct control..

Cybersecurity Data Security Industry Spotlight IoT & ICS Security Network
Security Security Awareness Security Boulevard (Original) Threat
Intelligence Vulnerabilities 


WIDESPREAD THREATS TARGET AUTOMOTIVE COMPANIES

December 3, 2021 Dec 3 | Pauline Losson 0
Cybersecurity Data Security Endpoint Industry Spotlight IoT & ICS
Security Malware Network Security Security Boulevard (Original) Threat
Intelligence Vulnerabilities 


CYBERATTACKS IN 2021 HIGHLIGHTED CRITICAL INFRASTRUCTURE RISKS

November 30, 2021 Nov 30 | Chen Fradkin 0
CISO Suite Cyberlaw Cybersecurity Governance, Risk & Compliance Industry
Spotlight IoT & ICS Security Network Security Security Awareness Security
Boulevard (Original) 


DEBUNKING MYTHS ABOUT CMMC 2.0

November 29, 2021 Nov 29 | Ed Bassett 0
Analytics & Intelligence Cybersecurity Governance, Risk & Compliance Industry
Spotlight Mobile Security Network Security Security Awareness Security Boulevard
(Original) 


THE ART (AND MATH) OF BALANCING CX WITH FRAUD PREVENTION

November 18, 2021 Nov 18 | Rafael Lourenco 0


UPCOMING WEBINARS

CONTROLLING PRIVACY AND THE USE OF DATA ASSETS

January 6, 2022, 11 AM EST
We’ve learned a lot from the failure of companies to stay on top of data privacy
and security and from their responses. It’s not just about the failure of any
single company, ... Read More

SECURING INFRASTRUCTURE-AS-CODE FROM TAMPERING AND MISCONFIGURATIONS

January 11, 2022, 3 PM EST
Moving applications and development to the cloud has delivered operational
benefits at scale. Faster release cycles and microservices architectures drive
complexity and a need for speed that can only be solved by ... Read More
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools
and service providers in the security field contribute to the community
discussion with original content. While there are vendor blogs in the Security
Bloggers Network, original content from these vendors are featured here. The
articles here must meet several criteria to be published:
 * * Must be original when published
 * * Must be vendor neutral
 * * Must be transparent as to authorship
 * * Must be of value to the community

Articles in the spotlight are authored by vendors. Some are even sponsored. If
you want to take the information with a grain of salt, that is entirely up to
you. When you think about it, who knows the use cases, product capabilities and
markets better than vendors? If you would like to submit an article to this
section, please write to editor@securityboulevard.com.



TECHSTRONG TV – LIVE


Watch latest episodes and shows


SUBSCRIBE TO OUR NEWSLETTERS

Get breaking news, free eBooks and upcoming events delivered to your inbox.
 * Email*
   
 * View Security Boulevard Privacy Policy
 * 
 * 
 * CAPTCHA
   
 * Comments
   
   This field is for validation purposes and should be left unchanged.



Δ


SECURITY BLOGGERS NETWORK - LATEST

3 hours ago | Serkan Korkut

CAPTURING YOUR SCREENSHOTS WITH FORESIGHT IN ACTION

5 hours ago | Vivek Gopalan

APACHE LOG4J REMOTE CODE EXECUTION VULNERABILITY (CVE-2021-44228)

6 hours ago | Kumar Shantanu Shantanu

LOG4SHELL: THE NEW ZERO-DAY VULNERABILITY IN LOG4J

7 hours ago | Allen

SECURITY WITH QOS OPTIMIZATION IN IOT

8 hours ago | John Bruggeman

HOW TO DETERMINE IF YOUR NETWORK SECURITY IS WORKING


MOST READ ON THE BOULEVARD

Preparing for Evolving Phishing Scams
Google Nukes Ad-Blockers—Manifest V3 is Coming
Apache Log4j Threatens, Well, Everything
Update: Log4Shell RCE Zero-Day—Reactions and Recriminations
How Cybersecurity Awareness Shifted in 2021
Log4Shell : JNDI Injection via Attackable Log4J
Log4j Vulnerability: APIs Causing Massive Risk Exposure
Log4Shell: Apache Log4j Remote Code Execution
SOC Technology Failures — Do They Matter?
0-Day Detection of Log4j2 vulnerability


UPCOMING WEBINARS

Jan 06


CONTROLLING PRIVACY AND THE USE OF DATA ASSETS

January 6, 2022 @ 11:00 am - 12:00 pm
Jan 11


SECURING INFRASTRUCTURE-AS-CODE FROM TAMPERING AND MISCONFIGURATIONS

January 11, 2022 @ 3:00 pm - 4:00 pm
Jan 12


REDUCING COMPLEXITY TO INCREASE INFRASTRUCTURE SECURITY

January 12, 2022 @ 1:00 pm - 2:00 pm
Jan 18


WHAT’S NEXT FOR DEVSECOPS: ‘SHIFT RIGHT’ FOR RUNTIME PROTECTION

January 18, 2022 @ 3:00 pm - 4:00 pm

More Webinars


RECENT SECURITY BOULEVARD CHATS

 * Cloud, DevSecOps and Network Security, All Together?
 * Security-as-Code with Tim Jefferson, Barracuda Networks
 * ASRTM with Rohit Sethi, Security Compass
 * Deception: Art or Science, Ofer Israeli, Illusive Networks
 * Tips to Secure IoT and Connected Systems w/ DigiCert


TOP STORIES

Application Security Cybersecurity Data Security Endpoint Featured Incident
Response Malware News Security Awareness Security Boulevard
(Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 


APACHE LOG4J THREATENS, WELL, EVERYTHING

December 11, 2021 Teri Robinson | 3 days ago 0
Analytics & Intelligence Application Security Best of 2021 Cloud
Security Cybersecurity Editorial Calendar Endpoint Featured Malware Most Read
This Week Network Security News Popular Post Security Boulevard
(Original) Spotlight 


GOOGLE NUKES AD-BLOCKERS—MANIFEST V3 IS COMING

December 10, 2021 Richi Jennings | 4 days ago 0
Blockchain Cyberlaw Cybersecurity Data Security Featured Governance, Risk &
Compliance Incident Response News Security Awareness Security Boulevard
(Original) Spotlight Threats & Breaches 


US CYBER COMMAND GOES ON THE OFFENSIVE

December 10, 2021 Christopher Burgess | Dec 10 0


SECURITY HUMOR

ROBERT M. LEE’S & JEFF HAAS’ LITTLE BOBBY COMIC – ‘WEEK 359’






JOIN THE COMMUNITY

 * Add your blog to Security Bloggers Network
 * Write for Security Boulevard
 * Bloggers Meetup and Awards
 * Ask a Question
 * Email: info@securityboulevard.com


USEFUL LINKS

 * About
 * Media Kit
 * Sponsors Info
 * Copyright
 * TOS
 * DMCA Compliance Statement
 * Privacy Policy


RELATED SITES

 * Techstrong Group
 * Container Journal
 * DevOps.com
 * Techstrong Research
 * Techstrong TV
 * DevOps Chat
 * DevOps Dozen
 * DevOps TV
 * Digital Anarchist

 * 
 * 
 * 
 * 
 * 
 * 
 * 


Copyright © 2021 Techstrong Group Inc. All rights reserved.




Notifications





previousnextslideshow