Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why is Fintech API Security Important in 2025

APIs (Application Programming Interfaces) are the invisible backbone of everything from mobile banking to cryptocurrency exchanges. These powerful interfaces enable transactions to become frictionless, allowing data to be shared in real-time and services to be integrated in new ways across platforms, thereby transforming the way financial services operate and delivering customer value. But that very interconnectedness that drives innovation also creates new points of risk.

And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets

We admit it – we’ve had our heads in the clouds recently. Since we started working with Wiz as one of their integration partners, we’ve been spending even more time thinking about cloud assets. And these assets are everywhere! Gartner predicts double digit growth across all cloud segments in 2025.

Bridging the Cyber Gap: Why Collective Resilience Starts with Empowering SMEs

Raising the bar for cybersecurity can’t happen in silos. Resilience comes from shared knowledge, mutual support, and proactive partnerships — between public and private sectors, large enterprises and small businesses, academia and industry. In this respect, joining the SOC4SME program to offer free services is not just a gesture — we’re doing it because we believe cybersecurity is a shared responsibility.

CrowdStrike Strengthens Data Security Across Endpoint, Cloud, and SaaS Applications

CrowdStrike is expanding the capabilities of CrowdStrike Falcon Data Protection and introducing a new offering, SaaS Threat Services, enabling security teams to protect sensitive data across endpoints, cloud environments, and GenAI and SaaS applications. Today’s adversaries are targeting data wherever it resides. As GenAI adoption accelerates, misconfigured applications and unsecured usage create new vectors for data exposure.

A Look Into the Secrets of MCP: The New Secret Leak Source

MCP rapidly enhances AI capabilities but introduces security challenges through its distributed architecture. Especially, the distributed nature of MCP requires a lot of NHIs and their secrets. Our research shows that MCP is a new source of leaks that already discloses real-world secrets.

Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations

In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats. Cyber threat intelligence (CTI) and threat detection have emerged as essential strategies for proactively identifying and mitigating cyber risks.

Threat Context monthly, April 2025: EncryptHub & Media Land leak

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from April about EncryptHub, EncryptRAT, and the Media Land leak.

7 Core Principles of an Effective Application Security Program

If you’re building software, chances are your environment looks nothing like it did a few years ago. Monolithic applications have given way to microservices. On-prem systems have migrated to multi-cloud. Waterfall has become agile, and developers are pushing code daily (sometimes hourly). Security, meanwhile, is still catching up.

A New Chapter for API Security: Introducing the Salt MCP Server

There are rare moments when the technology world takes a massive leap forward. Today is one of those moments. At Salt Security, we have always believed that APIs form the connective tissue of the modern enterprise. As AI accelerates the pace of business beyond anything we’ve seen before, a simple truth has become clear: The way we discover, understand, and secure APIs must evolve, or we will be left behind.