Hive Ransomware: Actively Targeting Hospitals

Most ransomware groups operating in the RaaS (Ransomware-as-a-Service) model have an internal code of ethics that includes avoiding breaching some specific sectors, such as hospitals or critical infrastructure, thus avoiding great harm to society and consequently drawing less attention from law enforcement.

Featured Post

Dev-first SAST: Increase your developer productivity while staying secure

Static application security testing (or SAST) used to be a term coined by the security team, to help developers test their code early in the software development life cycle (SDLC). Unlike dynamic testing, it does not require a working application, which allows developers to identify security vulnerabilities while they code, so they can spot them as soon as they appear and fix them when it's easiest and fastest to do so. This cuts down their future workload by decreasing the backlog of issues they'll have to address later.

How Kaseya fell victim to a ransomware attack

On July 2, 2021, the cybersecurity world woke up to yet another ransomware attack—this time, the victim was Kaseya, a software enterprise that provides IT management solutions predominantly to managed service providers (MSPs). The attack made a huge impact, affecting several MSPs and thousands of their customers. So, what exactly transpired in what most cybersecurity experts are calling the largest criminal ransomware attack on record?

Announcing Snyk's Series F: Leading the World to Developer Security

We’re proud to announce our Series F funding at a $8.5B valuation, co-led by Capital Ventures and Tiger Global! We believe in helping the world’s developers build secure applications and equipping security teams to meet the demands of the digital world. Thank you to our investors and community for supporting our vision. We're excited to continue our journey of advancing and leading developer security.

Open Source Risk Management in the Financial Sector

Banking has changed. In the past, financial institutions outsourced their technology. They had large consulting firms creating, managing, and maintaining their back-end systems. Although banks would have knowledge of the systems in place, they wouldn’t be running them on a day-to-day basis. That was the consultants’ responsibility. Recent years have seen a significant shift in the financial sector.

Anti-Money Laundering Compliance in 2021: How Transaction Monitoring Can Help You Keep Up with Emerging Threats

Every year, 2%-5% of the global GDP, or US$800 billion-US$2 trillion is being laundered across the globe. That’s almost equivalent to the GDP of Canada (1,643.40 billion USD in 2020) or Italy ($1,886.45 USD in 2020). Neither the record-breaking heat, nor the intense floods experienced around the world this summer seem to have stopped financial criminals from inventing new ways to hide illegal sources of their income.

Technology Professionals in Short Supply - 3 Tips to Retain Yours

In an article posted on the organization’s website, the Center for Strategic and International Studies (CISI.org) reported that, as of January 2019, the United States had 314,000 more available cybersecurity positions than it had trained professionals available to fill them. That was an increase of over 50% since 2015.