Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ensuring robust security of a containerized environment

In today’s rapidly evolving digital landscape, containerized microservices have become the lifeblood of application development and deployment. Resembling miniature virtual machines, these entities enable efficient code execution in any environment, be it an on-premises server, a public cloud, or even a laptop. This paradigm eliminates the criteria of platform compatibility and library dependency from the DevOps equation.

Top 18 AI Testing Tools in 2024

The impact of AI tools on software development is starting to make itself felt. As the productivity of developers increases, so does the necessity for software testing. Luckily, AI is also seeing increasing adoption in testing, enabling dev teams to ensure robust and secure software despite increasing output. In this in-depth guide, we will explore the top 18 AI testing tools in 2023 that have the potential to take your testing processes to the next level. Overview.

Netacea, BT & Cranfield University Experts Weigh In on Cumulative Cost of Bots

A panel of cybersecurity experts from BT, Cranfield University and Netacea recently came together to discuss the accumulating cost businesses face due to malicious automation. The webinar is now available to watch on demand (scroll to the bottom of this page or click here to watch it in full). You’ll hear our specialist panel analyze results from this year’s extensive survey into what bot attacks cost enterprise businesses.

Fireblocks researchers uncover first Account Abstraction wallet vulnerability

The Fireblocks research team recently uncovered an ERC-4337 Account Abstraction vulnerability in the smart contract wallet UniPass. Fireblocks worked with UniPass to fully mitigate the vulnerability, which was found in hundreds of mainnet wallets in a whitehat operation. All funds are now safe and accounted for.

Navigating the SEC's New Cybersecurity Disclosure Rules: A Guide for Businesses

The landscape of cybersecurity is evolving rapidly, and with it, so are the regulations governing it. One such significant development is the Securities and Exchange Commission's (SEC) recently finalised cybersecurity disclosure rules. These new rules are poised to change how businesses handle and disclose their cyber risk management strategies.

Amazon-themed PDF Phishing, Abusing LinkedIn and Twitter, Targets Microsoft Live Outlook Users

In August 2023, Netskope Threat Labs highlighted an increase in downloads of PDF phishing attachments in Microsoft Live Outlook, caused by a series of phishing campaigns targeting users of the email service. We took a closer look and found that these campaigns are mostly Amazon-themed scams with a few Apple and IRS-themed phishing attempts sprinkled throughout. Just like in our previously reported phishing blog posts, attackers are abusing free services in these campaigns.

Industrial Control Systems are Exposed: Breaking Down the Risks

The world had a security wake-up call recently. Organizations were alerted to nearly 100,000 exposed industrial control systems (ICS), potentially allowing an attacker to access and control physical infrastructure such as power grids, traffic light systems, security and water systems, and more. That’s not only a stark statistic but a critical call-to-action for organizations around the world.