❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 26 January 2026Security Boulevard

NDSS 2025 – ERW-Radar

26 January 2026 at 11:00

Authors, Creators & Presenters: Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering, Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering, CAS), Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)

PAPER
ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis

To evade existing antivirus software and detection systems, ransomware authors tend to obscure behavior differences with benign programs by imitating them or by weakening malicious behaviors during encryption. Existing defense solutions have limited effects on defending against evasive ransomware. Fortunately, through extensive observation, we find I/O behaviors of evasive ransomware exhibit a unique repetitiveness during encryption. This is rarely observed in benign programs. Besides, the $chi^2$ test and the probability distribution of byte streams can effectively distinguish encrypted files from benignly modified files. Inspired by these, we first propose ERW-Radar, a detection system, to detect evasive ransomware accurately and efficiently. We make three breakthroughs: 1) a contextual correlation mechanism to detect malicious behaviors; 2) a fine-grained content analysis mechanism to identify encrypted files; and 3) adaptive mechanisms to achieve a better trade-off between accuracy and efficiency. Experiments show that ERW-Radar detects evasive ransomware with an accuracy of 96.18% while maintaining a FPR of 5.36%. The average overhead of ERW-Radar is 5.09% in CPU utilization and 3.80% in memory utilization.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – ERW-Radar appeared first on Security Boulevard.

Secure, Reliable Terraform At Scale With Sonatype Nexus Repository

26 January 2026 at 09:00

Terraform has become the de facto standard for infrastructure as code (IaC). From cloud-native startups to global enterprises, teams rely on Terraform to define, provision, and manage infrastructure with speed and consistency across cloud and on-prem environments.

The post Secure, Reliable Terraform At Scale With Sonatype Nexus Repository appeared first on Security Boulevard.

Can Passkeys Be Exploited for Account Access?

Explore if passkeys can be exploited. Learn about potential vulnerabilities in passwordless authentication, fido2 implementation risks, and how to stay secure.

The post Can Passkeys Be Exploited for Account Access? appeared first on Security Boulevard.

The New ATO Playbook: Session Hijacking, MFA Bypass, and Credential Abuse Trends for 2026

26 January 2026 at 00:00

Account takeover didn’t disappear β€” it evolved Account takeover (ATO) and credential abuse aren’t new.What’s changed is how attackers do it and why many traditional defenses no longer catch it early. Today’s ATO attacks don’t always start with: Instead, they increasingly rely on: The result: fewer alerts, more successful takeovers. This shift reflects a broader …

The post The New ATO Playbook: Session Hijacking, MFA Bypass, and Credential Abuse Trends for 2026 appeared first on Security Boulevard.

Can NHIs management fit within tight cybersecurity budgets?

25 January 2026 at 17:00

Why Are Non-Human Identities Crucial in Cybersecurity? Have you ever considered how machine identities, or Non-Human Identities (NHIs), fit into your cybersecurity strategy? Where breaches and data leaks can have catastrophic consequences, ensuring that your digital is secure is more important than ever. Managing NHIs, which are essentially machine identities consisting of secrets such as […]

The post Can NHIs management fit within tight cybersecurity budgets? appeared first on Entro.

The post Can NHIs management fit within tight cybersecurity budgets? appeared first on Security Boulevard.

How impenetrable are secrets vaults in modern cybersecurity?

25 January 2026 at 17:00

What Makes Secrets Vaults Impenetrable in Modern Cybersecurity? What elevates the strength of secrets vaults in cybersecurity? With technology continues to evolve, the bedrock of secure information exchange lies in how effectively we handle Non-Human Identities (NHIs) and secrets management within our systems. Understanding the Critical Nature of Non-Human Identities NHIs play a pivotal role. […]

The post How impenetrable are secrets vaults in modern cybersecurity? appeared first on Entro.

The post How impenetrable are secrets vaults in modern cybersecurity? appeared first on Security Boulevard.

Are cloud-native AIs free from legacy security issues?

25 January 2026 at 17:00

Can Non-Human Identities Bridge the Security Gap in Cloud Environments? Non-Human Identities (NHIs) are quickly becoming a critical component in bridging the security gap in cloud environments. These machine identities are created by combining secretsβ€”encrypted passwords, tokens, or keysβ€”with permissions granted by destination servers. This complex interaction, akin to a tourist navigating international borders with […]

The post Are cloud-native AIs free from legacy security issues? appeared first on Entro.

The post Are cloud-native AIs free from legacy security issues? appeared first on Security Boulevard.

What capabilities should AI have for advanced threat detection?

25 January 2026 at 17:00

How Secure Are Your Machine Identities in the Cloud Environment? Have you ever pondered the extent to which machine identities are secured within your organization’s cloud infrastructure? Χ™Χ§Χ¨Χ§ businesses increasingly migrate to cloud environments, the management of Non-Human Identities (NHIs) has become a crucial aspect of a comprehensive security strategy. Machine identities, which are often […]

The post What capabilities should AI have for advanced threat detection? appeared first on Entro.

The post What capabilities should AI have for advanced threat detection? appeared first on Security Boulevard.

Yesterday β€” 25 January 2026Security Boulevard

What is User Managed Access?

Deep dive into User Managed Access (UMA). Learn how UMA 2.0 works with OAuth2 and OIDC to provide user-centric privacy and resource sharing in Enterprise SSO.

The post What is User Managed Access? appeared first on Security Boulevard.

A One-Page Introduction to CardSpace Technology

Explore the fundamentals of CardSpace technology, its role in the identity metasystem, and lessons for modern enterprise SSO and CIAM solutions.

The post A One-Page Introduction to CardSpace Technology appeared first on Security Boulevard.

NDSS 2025 – RContainer

25 January 2026 at 11:00

Session 10A: Confidential Computing 2

Authors, Creators & Presenters: Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Xiaoqi Jia (Institute of Information Engineering, Chinese Academy of Sciences), Peng Liu (The Pennsylvania State University, USA), Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston University, USA), Jiayun Chen (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Shaowen Xu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Zhenyu Song (Institute of Information Engineering, Chinese Academy of Science)

PAPER
RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives

Containers have become widely adopted in cloud platforms due to their efficient deployment and high resource utilization. However, their weak isolation has always posed a significant security concern. In this paper, we propose RContainer, a novel secure container architecture that protects containers from untrusted operating systems and enforces strong isolation among containers by extending ARM Confidential Computing Architecture (CCA) hardware primitives. RContainer introduces a small, trusted mini-OS that runs alongside the deprivileged OS, responsible for monitoring the control flow between the operating system and containers. Additionally, RContainer uses shim-style isolation, creating an isolated physical address space called con-shim for each container at the kernel layer through the Granule Protection Check mechanism. We have implemented RContainer on ARMv9-A Fixed Virtual Platform and ARMv8 hardware SoC for security analysis and performance evaluation. Experimental results demonstrate that RContainer can significantly enhance container security with a modest performance overhead and a minimal Trusted Computing Base (TCB).

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – RContainer appeared first on Security Boulevard.

Before yesterdaySecurity Boulevard

How is AI security evolving for better protection?

24 January 2026 at 17:00

How Can Non-Human Identities Enhance AI Security? What are the key challenges faced by organizations in managing cybersecurity for machine identities? With digital systems continue to evolve, cybersecurity professionals are increasingly focusing on the protection and management of Non-Human Identities (NHIs). These machine identities play a pivotal role in ensuring robust AI security and better […]

The post How is AI security evolving for better protection? appeared first on Entro.

The post How is AI security evolving for better protection? appeared first on Security Boulevard.

Can you trust AI with your digital secrets management?

24 January 2026 at 17:00

How Does Non-Human Identities (NHI) Impact Digital Secrets Management? Is your organization adequately prepared to manage non-human identities (NHIs) and protect your digital secrets? That’s a critical question. With cyber threats become more sophisticated, the role of NHIs in digital secrets management becomes increasingly vital. These machine identities are crucial in secure networks, especially in […]

The post Can you trust AI with your digital secrets management? appeared first on Entro.

The post Can you trust AI with your digital secrets management? appeared first on Security Boulevard.

How do NHIs deliver value in digital security landscapes?

24 January 2026 at 17:00

Is Your Organization Missing Out on the Value of Non-Human Identities in Digital Security? The rapid expansion of cloud environments has ushered in a powerful yet complex challenge: managing digital identities that aren’t tied to any one person. These Non-Human Identities (NHIs), which often take the form of machine identities, are integral to a secure […]

The post How do NHIs deliver value in digital security landscapes? appeared first on Entro.

The post How do NHIs deliver value in digital security landscapes? appeared first on Security Boulevard.

❌
❌