Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Gasless Transactions: Send Any Token Without Gas Fees on EVM Chains

This week, Fireblocks announced a series of new products and features to make the blockchain experience a whole lot smoother. Whether onboarding users, scaling a DeFi app, or powering global payments, gas fees have long been a barrier to seamless retail applications for digital assets. With Universal Gasless, Fireblocks is removing a significant blockchain complexity.

Impersonating Meta, Powered by AppSheet: A Rising Phishing Campaign Exploits Trusted Platforms to Evade Detection

Since March 2025, the KnowBe4 Threat Labs team has observed a surge in phishing attacks that exploit Google’s AppSheet platform to launch a highly targeted, sophisticated campaign impersonating social media platform giant Meta.

Measuring DevOps Success: The Metrics That Matter

You can’t optimize your DevOps if you don’t track its metrics. However, measuring DevOps performance isn’t only about vanity charts or arbitrary numbers. The right indicators show how well your software delivery solutions perform under pressure. Combined with resilience architecture, these metrics guide your engineering teams to reduce lead time, cut failure rates, and recover faster.

What is NoSQL Injection? | Examples & How to Prevent It

NoSQL Injection is a serious web security flaw that targets NoSQL databases like MongoDB. In this video, you’ll learn: What NoSQL injection is How attackers exploit unsanitized inputs Real-world NoSQL injection examples Best practices to prevent these attacks Secure your applications with proper input validation and safe query building techniques.

Layer 7 DDoS Attacks: How Hackers Target the Application Layer

Layer 7 DDoS attacks—also known as application-layer attacks—target the part of your application that users interact with, like login pages, search boxes, and APIs. Unlike traditional volumetric DDoS attacks, these are stealthy, harder to detect, and can take down your app using fewer requests.

Turn your weakest link into your strongest security ally

IT and security professionals should remember that they are specialists in their field with additional training and expertise in managing computer systems. Just because end users in other departments aren’t up to your level doesn’t mean they are a lost cause. In fact, your non-technical end users are a critical piece of your security program, acting as your eyes and ears to spot threats early and sound the alarm.

Open Banking API Management

Open banking is often mischaracterized as a purely technical transformation—an initiative to expose financial services through APIs to third parties. But framing it this way overlooks the more profound shift underway. At its core, open banking is a re-architecture of digital trust, where customer data, once locked behind proprietary systems, becomes mobile, programmable, and subject to constant third-party interaction.