securityboulevard.com
Open in
urlscan Pro
2606:4700:10::ac43:f6b
Public Scan
Submitted URL: https://securityboulevard.com.mcas-gov.us/
Effective URL: https://securityboulevard.com/
Submission: On December 15 via automatic, source certstream-suspicious — Scanned from US
Effective URL: https://securityboulevard.com/
Submission: On December 15 via automatic, source certstream-suspicious — Scanned from US
Form analysis
2 forms found in the DOMGET https://securityboulevard.com/
<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
<div class="search-wrap">
<input type="text" placeholder="Search" class="s field" name="s">
<button class="search-icon" type="submit"></button>
</div>
</form>
POST /
<form method="post" enctype="multipart/form-data" id="gform_10" action="/">
<div class="gform_body gform-body">
<ul id="gform_fields_10" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_10_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_1">Email<span class="gfield_required"><span
class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_1" id="input_10_1" type="text" value="" class="large" placeholder="Your Email" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_10_2" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible">
<div class="gsection_description"><a href="https://securityboulevard.com/privacy-policy/">View Security Boulevard <u>Privacy Policy</u></a></div>
</li>
<li id="field_10_3" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
<div class="ginput_container ginput_container_text"><input name="input_3" id="input_10_3" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_10_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
<div class="ginput_container ginput_container_text"><input name="input_4" id="input_10_4" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
</li>
<li id="field_10_5" class="gfield gfield--width-full field_sublabel_below field_description_below hidden_label gfield_visibility_visible"><label class="gfield_label" for="input_10_5">CAPTCHA</label>
<div id="input_10_5" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Ld9rm8cAAAAAEa1mXDqRlCvlsP8t1u1weqyOCJn&co=aHR0cHM6Ly9zZWN1cml0eWJvdWxldmFyZC5jb206NDQz&hl=en&v=VZKEDW9wslPbEc9RmzMqaOAP&theme=light&size=invisible&badge=bottomright&cb=p9nv9oep3rf1"
width="256" height="60" role="presentation" name="a-njldknk8yrku" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
tabindex="-1"></iframe></div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div>
</li>
<li id="field_10_6" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_10_6">Comments</label>
<div class="ginput_container"><input name="input_6" id="input_10_6" type="text" value=""></div>
<div class="gfield_description" id="gfield_description_10_6">This field is for validation purposes and should be left unchanged.</div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_10" class="gform_button button" value="Subscribe Now"
onclick="if (!window.__cfRLUnblockHandlers) return false; if(window["gf_submitting_10"]){return false;} window["gf_submitting_10"]=true; "
onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window["gf_submitting_10"]){return false;} window["gf_submitting_10"]=true; jQuery("#gform_10").trigger("submit",[true]); }">
<input type="hidden" class="gform_hidden" name="is_submit_10" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="10">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_10" value="WyJbXSIsImExN2ZmNzMxNzRmOWUyZjU4NDM0NzI5MzVhYzMzZjI2Il0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_10" id="gform_target_page_number_10" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_10" id="gform_source_page_number_10" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
<p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js" name="ak_js" value="1639583137145"></p>
</form>
Text Content
Wednesday, December 15, 2021 * Capturing your screenshots with Foresight in Action * Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228) * Log4Shell: The New Zero-Day Vulnerability in Log4j * Security with QoS Optimization in IoT * How to Determine if Your Network Security is Working * * * * * * * SECURITY BOULEVARD The Home of the Security Bloggers Network Community Chats Webinars Library * Home * Cybersecurity News * Features * Industry Spotlight * News Releases * Security Bloggers Network * Latest Posts * Contributors * Syndicate Your Blog * Write for Security Boulevard * Events * Upcoming Events * Upcoming Webinars * On-Demand Events * On-Demand Webinars * Chat * Security Boulevard Chat * Marketing InSecurity Podcast * Library * Related Sites * Techstrong Group * Container Journal * DevOps.com * Security Boulevard * Techstrong Research * Techstrong TV * Devops Chat * DevOps Dozen * DevOps TV * Digital Anarchist * Media Kit * About Us * Analytics * AppSec * CISO * Cloud * DevOps * GRC * Identity * Incident Response * IoT / ICS * Threats / Breaches * More * Blockchain / Digital Currencies * Careers * Cyberlaw * Mobile * Social Engineering * Humor WHEN NOT TO TRUST ZERO-TRUST Dec 15 | Sue Poremba KRONOS SENDS CLIENTS ELSEWHERE AFTER RANSOMWARE ATTACK Dec 14 | Teri Robinson HERE WE GO AGAIN: SECOND LOG4J FLAW SURFACES Dec 14 | Teri Robinson APPLE AIRTAG ANDROID APP IS ABSOLUTELY AWFUL—TRACKER DETECT FAIL Dec 14 | Richi Jennings TELEPORT ADDS WINDOWS SUPPORT TO INFRASTRUCTURE SECURITY GATEWAY Dec 14 | Michael Vizard TOPIC SPOTLIGHT: BEST OF 2021 APPLE AIRTAG ANDROID APP IS ABSOLUTELY AWFUL—TRACKER DETECT FAIL December 14, 2021 | Richi Jennings CYBEREASON MAKES LOG4SHELL ‘VACCINE’ AVAILABLE December 13, 2021 | Michael Vizard UPDATE: LOG4SHELL RCE ZERO-DAY—REACTIONS AND RECRIMINATIONS December 13, 2021 | Richi Jennings ANALYTICS AND INTELLIGENCE Cybersecurity Featured Network Security Security Boulevard (Original) Threat Intelligence HOW TO DETERMINE IF YOUR NETWORK SECURITY IS WORKING December 15, 2021 Dec 15 | John Bruggeman 0 Cybersecurity Data Security Endpoint Featured Incident Response Malware Network Security Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities KRONOS SENDS CLIENTS ELSEWHERE AFTER RANSOMWARE ATTACK December 14, 2021 Dec 14 | Teri Robinson 0 Application Security Cybersecurity Featured Incident Response Malware News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities HERE WE GO AGAIN: SECOND LOG4J FLAW SURFACES December 14, 2021 Dec 14 | Teri Robinson 0 More Analytics and Intelligence APPLICATION SECURITY Application Security Cloud Security Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Network Security Security Boulevard (Original) Spotlight WHEN NOT TO TRUST ZERO-TRUST December 15, 2021 Dec 15 | Sue Poremba 0 Analytics & Intelligence Application Security Best of 2021 Cloud Security Cyberlaw Cybersecurity Editorial Calendar Featured Governance, Risk & Compliance Identity & Access IoT & ICS Security Mobile Security Most Read This Week News Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches APPLE AIRTAG ANDROID APP IS ABSOLUTELY AWFUL—TRACKER DETECT FAIL December 14, 2021 Dec 14 | Richi Jennings 0 Application Security Security Bloggers Network Vulnerabilities CYBERATTACKS IN 2022 WILL LOOK FAMILIAR December 14, 2021 Dec 14 | Andrew Useckas 0 More Application Security CISO CISO Suite Data Security Security Bloggers Network Threats & Breaches LOG4J 2 – BEYOND PATCHING: WHAT’S NEXT? December 14, 2021 Dec 14 | Jeff Moncrief 0 CISO Suite Security Bloggers Network CYBEREASON TAPS FORMER DYSON CISO CK CHIM AS FIELD CSO TO SUPPORT APAC EXPANSION December 8, 2021 Dec 8 | Cybereason Security Team 0 Best of 2021 CISO Suite Cybersecurity Editorial Calendar Featured Identity & Access Incident Response Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence IT’S NOT A USER PROBLEM; IT’S A CYBERSECURITY PEOPLE PROBLEM December 8, 2021 Dec 8 | Sue Poremba 0 More CISO CLOUD SECURITY Cloud Security Cybersecurity Featured Identity & Access IoT & ICS Security News Security Awareness Security Boulevard (Original) Spotlight Vulnerabilities TELEPORT ADDS WINDOWS SUPPORT TO INFRASTRUCTURE SECURITY GATEWAY December 14, 2021 Dec 14 | Michael Vizard 0 Cloud Security Cybersecurity Data Security Governance, Risk & Compliance Incident Response Security Boulevard (Original) Vulnerabilities SUPPLY CHAIN ATTACKS AND CYBERINSURANCE December 14, 2021 Dec 14 | Eran Orzel 0 Application Security Cloud Security Cybersecurity Data Security Identity & Access Malware Security Boulevard (Original) Threat Intelligence PREPARING FOR EVOLVING PHISHING SCAMS December 14, 2021 Dec 14 | Manoj Srivastava 0 More Cloud Security DEVOPS SECURITY DevOps Security Bloggers Network CAPTURING YOUR SCREENSHOTS WITH FORESIGHT IN ACTION December 15, 2021 Dec 15 | Serkan Korkut 0 DevOps Security Bloggers Network Vulnerabilities LOG4SHELL VULNERABILITY: WHAT SECURITY OPERATIONS TEAMS NEED TO KNOW NOW AND HOW SOAR CAN HELP YOU DETECT AND RESPOND December 14, 2021 Dec 14 | Dan Kaplan 0 DevOps Security Bloggers Network SCALING TO SCALA December 13, 2021 Dec 13 | Erik Costlow, Principal Product Evangelist 0 More DevOps Security INCIDENT RESPONSE Application Security Best of 2021 Cybersecurity Editorial Calendar Featured Incident Response Malware News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities CYBEREASON MAKES LOG4SHELL ‘VACCINE’ AVAILABLE December 13, 2021 Dec 13 | Michael Vizard 0 Analytics & Intelligence Application Security Best of 2021 Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Incident Response Malware Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities UPDATE: LOG4SHELL RCE ZERO-DAY—REACTIONS AND RECRIMINATIONS December 13, 2021 Dec 13 | Richi Jennings 0 Application Security Cloud Security Cybersecurity Data Security Incident Response Malware Network Security Security Awareness Security Boulevard (Original) HOW CYBERSECURITY AWARENESS SHIFTED IN 2021 December 13, 2021 Dec 13 | Darren Guccione 0 More Incident Response IOT & ICS SECURITY Cloud Security Cybersecurity Data Security Endpoint IoT & ICS Security Mobile Security Network Security Security Boulevard (Original) HOW SASE ENABLES AND SECURES 5G NETWORKS December 13, 2021 Dec 13 | Michael Wood 0 Cloud Security Cybersecurity Data Security Featured IoT & ICS Security Network Security News Security Awareness Security Boulevard (Original) Spotlight CISCO SURVEY SURFACES LEGACY INFRASTRUCTURE SECURITY CHALLENGES December 7, 2021 Dec 7 | Michael Vizard 0 Analytics & Intelligence Cloud Security Cybersecurity Data Security Endpoint Featured Identity & Access Incident Response IoT & ICS Security Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities HOME ROUTERS ARE FULL OF SECURITY BUGS—PATCH NOW December 6, 2021 Dec 6 | Richi Jennings 0 More IoT & ICS Security THREATS AND BREACHES Security Bloggers Network Vulnerabilities LOG4SHELL: THE NEW ZERO-DAY VULNERABILITY IN LOG4J December 15, 2021 Dec 15 | Kumar Shantanu Shantanu 0 Security Bloggers Network Vulnerabilities BROAD EXPOSURE TO LOG4SHELL CVE-2021-44228 HIGHLIGHTS HOW THE ATTACK SURFACE HAS EXPLODED December 14, 2021 Dec 14 | Vinay Sridhara 0 Security Bloggers Network Vulnerabilities LOG4J VULNERABILITY: THE PERFECT HOLIDAY PRESENT THAT NOBODY WANTS December 14, 2021 Dec 14 | Ben Martin 0 More Threats and Breaches INDUSTRY SPOTLIGHT Careers Cyberlaw Cybersecurity Governance, Risk & Compliance Industry Spotlight Security Boulevard (Original) Threat Intelligence WHY PUBLIC-PRIVATE PARTNERSHIP IS KEY TO CYBERSECURITY December 8, 2021 Dec 8 | Luke Tenery 0 The federal government is currently handicapped in a way it has not experienced before. Because the digital domain is man-made, governments around the world have different levels of access and freedom of movement within it. In western democracies, the vast majority of the digital domain is privately held and, thus, outside of the direct control.. Cybersecurity Data Security Industry Spotlight IoT & ICS Security Network Security Security Awareness Security Boulevard (Original) Threat Intelligence Vulnerabilities WIDESPREAD THREATS TARGET AUTOMOTIVE COMPANIES December 3, 2021 Dec 3 | Pauline Losson 0 Cybersecurity Data Security Endpoint Industry Spotlight IoT & ICS Security Malware Network Security Security Boulevard (Original) Threat Intelligence Vulnerabilities CYBERATTACKS IN 2021 HIGHLIGHTED CRITICAL INFRASTRUCTURE RISKS November 30, 2021 Nov 30 | Chen Fradkin 0 CISO Suite Cyberlaw Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Network Security Security Awareness Security Boulevard (Original) DEBUNKING MYTHS ABOUT CMMC 2.0 November 29, 2021 Nov 29 | Ed Bassett 0 Analytics & Intelligence Cybersecurity Governance, Risk & Compliance Industry Spotlight Mobile Security Network Security Security Awareness Security Boulevard (Original) THE ART (AND MATH) OF BALANCING CX WITH FRAUD PREVENTION November 18, 2021 Nov 18 | Rafael Lourenco 0 UPCOMING WEBINARS CONTROLLING PRIVACY AND THE USE OF DATA ASSETS January 6, 2022, 11 AM EST We’ve learned a lot from the failure of companies to stay on top of data privacy and security and from their responses. It’s not just about the failure of any single company, ... Read More SECURING INFRASTRUCTURE-AS-CODE FROM TAMPERING AND MISCONFIGURATIONS January 11, 2022, 3 PM EST Moving applications and development to the cloud has delivered operational benefits at scale. Faster release cycles and microservices architectures drive complexity and a need for speed that can only be solved by ... Read More Click here for Industry spotlight inclusion guidelines The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content. While there are vendor blogs in the Security Bloggers Network, original content from these vendors are featured here. The articles here must meet several criteria to be published: * * Must be original when published * * Must be vendor neutral * * Must be transparent as to authorship * * Must be of value to the community Articles in the spotlight are authored by vendors. Some are even sponsored. If you want to take the information with a grain of salt, that is entirely up to you. When you think about it, who knows the use cases, product capabilities and markets better than vendors? If you would like to submit an article to this section, please write to editor@securityboulevard.com. TECHSTRONG TV – LIVE Watch latest episodes and shows SUBSCRIBE TO OUR NEWSLETTERS Get breaking news, free eBooks and upcoming events delivered to your inbox. * Email* * View Security Boulevard Privacy Policy * * * CAPTCHA * Comments This field is for validation purposes and should be left unchanged. Δ SECURITY BLOGGERS NETWORK - LATEST 3 hours ago | Serkan Korkut CAPTURING YOUR SCREENSHOTS WITH FORESIGHT IN ACTION 5 hours ago | Vivek Gopalan APACHE LOG4J REMOTE CODE EXECUTION VULNERABILITY (CVE-2021-44228) 6 hours ago | Kumar Shantanu Shantanu LOG4SHELL: THE NEW ZERO-DAY VULNERABILITY IN LOG4J 7 hours ago | Allen SECURITY WITH QOS OPTIMIZATION IN IOT 8 hours ago | John Bruggeman HOW TO DETERMINE IF YOUR NETWORK SECURITY IS WORKING MOST READ ON THE BOULEVARD Preparing for Evolving Phishing Scams Google Nukes Ad-Blockers—Manifest V3 is Coming Apache Log4j Threatens, Well, Everything Update: Log4Shell RCE Zero-Day—Reactions and Recriminations How Cybersecurity Awareness Shifted in 2021 Log4Shell : JNDI Injection via Attackable Log4J Log4j Vulnerability: APIs Causing Massive Risk Exposure Log4Shell: Apache Log4j Remote Code Execution SOC Technology Failures — Do They Matter? 0-Day Detection of Log4j2 vulnerability UPCOMING WEBINARS Jan 06 CONTROLLING PRIVACY AND THE USE OF DATA ASSETS January 6, 2022 @ 11:00 am - 12:00 pm Jan 11 SECURING INFRASTRUCTURE-AS-CODE FROM TAMPERING AND MISCONFIGURATIONS January 11, 2022 @ 3:00 pm - 4:00 pm Jan 12 REDUCING COMPLEXITY TO INCREASE INFRASTRUCTURE SECURITY January 12, 2022 @ 1:00 pm - 2:00 pm Jan 18 WHAT’S NEXT FOR DEVSECOPS: ‘SHIFT RIGHT’ FOR RUNTIME PROTECTION January 18, 2022 @ 3:00 pm - 4:00 pm More Webinars RECENT SECURITY BOULEVARD CHATS * Cloud, DevSecOps and Network Security, All Together? * Security-as-Code with Tim Jefferson, Barracuda Networks * ASRTM with Rohit Sethi, Security Compass * Deception: Art or Science, Ofer Israeli, Illusive Networks * Tips to Secure IoT and Connected Systems w/ DigiCert TOP STORIES Application Security Cybersecurity Data Security Endpoint Featured Incident Response Malware News Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities APACHE LOG4J THREATENS, WELL, EVERYTHING December 11, 2021 Teri Robinson | 3 days ago 0 Analytics & Intelligence Application Security Best of 2021 Cloud Security Cybersecurity Editorial Calendar Endpoint Featured Malware Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight GOOGLE NUKES AD-BLOCKERS—MANIFEST V3 IS COMING December 10, 2021 Richi Jennings | 4 days ago 0 Blockchain Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response News Security Awareness Security Boulevard (Original) Spotlight Threats & Breaches US CYBER COMMAND GOES ON THE OFFENSIVE December 10, 2021 Christopher Burgess | Dec 10 0 SECURITY HUMOR ROBERT M. LEE’S & JEFF HAAS’ LITTLE BOBBY COMIC – ‘WEEK 359’ JOIN THE COMMUNITY * Add your blog to Security Bloggers Network * Write for Security Boulevard * Bloggers Meetup and Awards * Ask a Question * Email: info@securityboulevard.com USEFUL LINKS * About * Media Kit * Sponsors Info * Copyright * TOS * DMCA Compliance Statement * Privacy Policy RELATED SITES * Techstrong Group * Container Journal * DevOps.com * Techstrong Research * Techstrong TV * DevOps Chat * DevOps Dozen * DevOps TV * Digital Anarchist * * * * * * * Copyright © 2021 Techstrong Group Inc. All rights reserved. Notifications previousnextslideshow