Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional computers - could potentially turn data security on its head.

Data Modernisation in Telecom: From Reactive Protection to Proactive Opportunity

In our last blog, we discussed the many challenges faced by telecom organisations in this ever-changing regulatory and technical landscape. While it is clear to see the challenges the industry faces in this digital world, there’s also a unique opportunity to solve the many problems that hold them back.

Venmo threat sees increase in fraudulent payment requests

Since January 13th, 2024, our Threat Intelligence team has seen a steep rise in the number of fraudulent payment attacks using Venmo. By hacking existing or setting up new Venmo accounts, cybercriminals are using legitimate Venmo communications to trick users into approving fraudulent payments.

Cato XDR Story Similarity - A Data Driven Incident Comparison and Severity Prediction Model

At Cato our number one goal has always been to simplify networking and security, we even wrote it on a cake once so it must be true: Figure 1 – A birthday cake Applying this principle to our XDR offering, we aimed at reducing the complexity of analyzing security and network incidents, using a data-driven approach that is based on the vast amounts of data we see across our global network and collect into our data lake.

Fireblocks Integrates with BCB Group's BLINC to enable Fiat Transfers Across Major Global Currencies

Fireblocks now offers instant fiat-to-crypto transfers across 5 of the most highly-transacted global fiat currencies, thanks to our integration with BCB Group. This advancement leverages the BLINC network, providing Fireblocks customers with the ability to quickly fund their exchange accounts and facilitate 24/7 fiat movement between trading venues and counterparties.

How to secure your cloud credentials against AndroxGh0st

On January 16, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) sent out a Cybersecurity Advisory (CSA) about active threat actors deploying the AndroxGh0st malware. This is significant as cyber criminals are actively using this malware to target Laravel (CVE-2018-15133) (an open source PHP framework).env files and obtain credentials for various high profile applications like Office365, SendGrid, and Twilio.

Data Subject GDPR Requests: Rights and Requirements

The General Data Protection Regulation (GDPR) is a European Union law that governs how companies may collect and use the personal data of EU residents. It establishes standards that help ensure that this data is not stored, handled or shared in a way that would expose individuals to risk. The law also specifies how organizations must respond in case of a data breach.