Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wells Fargo Scam Texts: How To Spot Them

Texting has taken over the global communication space; marketers and predators are seeing huge dollar signs. Email continues to be a reliable, but somewhat fraught with problems, alternative form of communication. In fact, the average user interacts, sends, and receives 25% more texts than email, and usage is skyrocketing. Most electronic device users have loads more unopened emails than texts.

The 4 pillars of great treasury management in Web3

Running and scaling treasury management operations is vital to ensuring that your team and users can get the most out of your Web3 product. Fireblocks has helped teams secure and streamline their digital assets operations for 4 years, and here are our top 4 suggestions to help take your treasury management operations from good to great.

Q&A Chat with Eyal Webber-Zvik on Cato RBI

Today Cato Networks announced the addition of the Cato RBI to our Cato SASE Cloud platform. It is an exciting day for us and for our customers. Why? Because Cato’s cloud-native, security stack just got better, and without any added complexity. I sat down with Eyal Webber-Zvik, Vice President of Product Marketing and Strategic Alliances at Cato Networks, and asked him to provide his perspective on what is Cato RBI and what this means for Cato’s customers.

Why you're struggling with data protection

This blog is based on insight from our 2023 State of Cyber Security report. This month sees GDPR celebrate its 5th birthday, and during that time it’s stayed more-or-less the same. With unchanging rules and half a decade of time to get data protection things in order, you might think that the need for GDPR consultancy is dwindling. However, as we showed in our 2023 State of Cyber Security report, that’s sadly not the case.

BlackCat Ransomware Group Says Aloha to POS

Cyber attacks can have a significant impact on point-of-sale (POS) services, which are used in retail environments to process transactions and collect payments from customers. POS systems typically involve the use of software, hardware, and network components, which can be vulnerable to a variety of cyber threats. A successful campaign targeting POS systems can result in credit card theft, transaction tampering, service disruption, brand damage and other severe organizational damage.

Ransomware trends: the European transport sector

As Aviation, Maritime, Rail and Road transport organisations are reportedly experiencing increased levels of ransomware activity across Europe as per ENISA’s recent report, JUMPSEC analysts have combined the findings with JUMPSEC’s attacker reported data scraped from a variety of sources (including the dark web) providing further context to the risks currently posed to European transport organisations.

What is Software Bill of Materials (SBOM) & Why Is It So Important?

Computer software is a complicated construct composed of numerous diverse components. Open-source software is becoming ever more common as a building block in software. This phenomenon is accompanied by an increase in exploitable vulnerabilities, so being able to tell quickly what your software is composed of is becoming increasingly important - both in applications that you develop yourselves and the ones from suppliers and vendors.

[Heads Up] The New FedNow Service Opens Massive New Attack Surface

You may not have heard of this service planned for July 2023, but it promises a massive new social engineering attack surface. This is from their website: "About the FedNowSM Service. The FedNow Service is a new instant payment infrastructure developed by the Federal Reserve that allows financial institutions of every size across the U.S. to provide safe and efficient instant payment services.