Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Financial Institutions and Cybersecurity Risk: Why you need ISO27001

When it comes to law enforcement crime investigations, there is a maxim of, “follow the money”. This broadly means that if you can follow the money trail, it will eventually lead you to the perpetrator of the crime. In today’s modern society, money has now become a series of binary ones and zeros that are transferred between bank accounts without any real effort on either party, and cybercriminals are fully aware of how easy, and fragile, this process is.

What is a Hardware Security Module? Role of HSMs for Digital Signing

Imagine signing an important digital document, only to realize that your signature has been compromised and your sensitive information is now at risk. Scary, right? That’s where Hardware Security Modules (HSMs) come in! They are the unsung heroes of digital security, ensuring that your digital signatures remain safe and secure. According to a study, the market is expected to reach US$ 1,667.4 Mn by 2032, exhibiting growth at 14.3% CAGR between 2022 and 2032. But what is it?

Tofsee Botnet: Proxying and Mining

In January 2023, PrivateLoader, a malware loader from a pay-per-install malware distribution service called “ruzki”, started to distribute Tofsee (a.k.a. Gheg), a modular spambot. Spambots are typically utilized by cybercriminals to spread malware and phishing emails, and this particular one has been in operation since at least 2008.

LTT Attack Targets Session Cookies to Push Crypto Scam

Crypto scams are skyrocketing: In 2022, the FBI tracked an 183% year-over-year increase, driving $2.57 billion in losses. Last week, the popular YouTube channel Linus Tech Tips (LTT for short) – and two associated channels – became the latest crypto scam victim and unsuspecting accomplice.

ChatGPT Suffered From a Major Data Breach Exposing its Subscribers

ChatGPT is OpenAi's chatbot designed to simulate conversations with other people. The tool utilizes a massive language model to produce realistic and believable responses for a conversation. OpenAI offers a subscription service known as ChatGPT Plus that offers preferential access to the powerful AI system for subscribers. Some of these subscribers were exposed in the first-ever ChatGPT data breach that occurred in March this year.

It Takes a Village: The Power of Partnership in Creating Secure Software

Application security is about so much more than scanning. The Velocity Partner Program aligns Veracode and our Partners as together we deliver application security solutions and services that enable customers to build a secure DevOps program. The Velocity Partner Program empowers our partners in their trusted advisor role to address key security requirements and business challenges customers are facing throughout their application security journey.

Kroll recognised as an MDR Champion by Bloor Research

In this blog post, we provide a brief overview of the report and its perspective on changes in the MDR market. We are proud to have been named as an MDR Champion by Bloor in its latest report. This isn’t the first time that Bloor has recognised us in this way, as it previously identified Redscan an MDR Champion in 2020.

The 443 Episode 235 - The NSA's Guidance on Securing Authentication

This week we have all the acronyms as we cover a joint publication by CISA and the NSA with Identity and Access Management (IAM) best practices. We then cover some new proposed cybersecurity rules out of the Securities and Exchange Commission (SEC) before ending with an FBI takedown of a popular hacking forum. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Is Clop Ransomware the New Threat to Watch?

Clop, aka Cl0p, is a ransomware group that emerged in February 2019 and targeted almost any sector in the world, including retail, transportation, education, manufacturing, automotive, energy, financial, telecommunications and even healthcare. The clop ransomware group is linked as a successor of the CryptoMix ransomware group. The Cyberint Research Team identified an anomaly in Clop’s activity in the past two weeks.