Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enhancing Fund Tokenization Operations and Management with Fireblocks x Tokeny

Tokenization is gaining momentum in the financial world; more and more financial institutions recognize the impact it will have on how financial products are created, traded, and managed. It is estimated that the potential value of tokenized assets will reach about $16 trillion by 2030.

New Operating Models of Digital Asset Trading

‘Traditional’ equities trading has undergone massive transformation over centuries. The evolution of how trades are conducted reflects technological advancements, market demands, and the need for efficiency. From the establishment of stock exchanges to the emergence of electronic communication networks (ECNs), the journey from disruption to adoption paints a clear picture of the changing landscape.

Leveraging CrowdStrike Falcon Against Attacks Targeting Okta Environments

As more organizations move to software-as-a-service (SaaS), remote access to applications and data is concentrated among a smaller set of identity providers. These identity providers, such as Okta, must absorb growing volumes of credential-based attacks. Okta consistently reports high volumes of credential stuffing, password spraying and phishing attacks against its customers. Additionally, red teams are discovering new patterns of abuse relevant to Okta products.

What Does The NIS2 Directive Mean for Cybersecurity in the EU?

With the growing cyberattacks threatening business and customer data, Chief Information Security Officers (CISO) are working to implement the NIS2 Directive into their organization to strengthen their digital security. NIS2 is mandatory for all medium-sized and large organizations within vital sectors in the EU.

AI-Driven Case Management Built for the Modern Security Team

Case management for modern SOCs can be a maze of endless alerts, overwhelming data, and intense pressure. Legacy solutions often exacerbate these issues with rigid workflows, limited automation capabilities, and a lack of real-time adaptability, leaving teams ill-equipped to handle the growing complexity of threats. The volume of cases, manual workflows, and processes leave analysts overwhelmed, exhausted, and struggling to keep pace.

Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4

Welcome to the 20th edition of the Cloudflare DDoS Threat Report, marking five years since our first report in 2020. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the fourth quarter of 2024 and look back at the year as a whole.

API Security's Role in Responsible AI Deployment

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the world. What you may not be aware of, however, is the role Application Programming Interfaces (APIs) are playing in the AI revolution. The bottom line is that APIs are critical to AI systems – but they are also a major reason why AI systems are vulnerable to abuse. In this blog, we’ll explore why API security is critical for the safe and ethical deployment of AI.

Mastering Network Traffic Pattern Analysis for Enhanced Performance

Analyzing network traffic patterns is the heart of a successful security strategy. As organizations continue to grow their digital landscapes, cyber threats have also progressed in complexity and now utilize sophisticated evasion techniques to evade detection. Conventional security countermeasures are no longer able to cope with such dynamic and persistent security threats, hence now organizations are relying on network traffic analysis to detect and mitigate any security incidents.

Inside the Belsen Group Attack: 15000 FortiGate VPN Credentials and Configurations Exposed

It was in January 2025 when a disaster leakage of data was leaked having more than 15,000 configuration files carrying VPN credentials leaked from FortiGate devices spread on several devices. It depicts acute problems inside organizations using the products by Fortinet about a higher need for an excellent security approach. The Belsen Group, the hacking collective carried out this attack by taking advantage of the zero-day vulnerability known as CVE-2022-40684.