Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



The Blockchain In Cybersecurity: Blockchain SIEM

It’s no secret that cybersecurity is one of the main challenges currently faced by our society. Hackers who got into government servers and private communication services have become a global threat. The blockchain could be a revolutionary technology in the fight against cyber threats, offering to protect databases and generally ensure integrity. Data protection is today’s top cybersecurity priority for any company.


8 blockchain security issues you are likely to encounter

Blockchain technology has grown up in popularity in recent years. Excluding its initial application in cryptocurrency, it's currently getting used in property, healthcare, smart contracts and many other fields. The technology collects and stores information in groupings referred to as “blocks” and every block will hold a collection quantity of knowledge.


Crypto and phishing - how criminals are cashing in

Over the past several years, crypto has become increasingly mainstream. Research has predicted that by the end of 2022, the number of US adults who own at least one cryptocurrency will increase by 19% to 33.7 million. This equates to 12.8% of the population. Naturally, cybercriminals have quickly learned how to cash in on this popularity.


Cryptominer detection: a Machine Learning approach

Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for a financially motivated attacker. Moreover, this kind of malware can pass unnoticed because, with proper evasive techniques, they may not disrupt a company’s business operations. Given all the possible elusive strategies, detecting cryptominers is a complex task, but machine learning could help to develop a robust detection algorithm.


Detect cryptojacking with Sysdig's high-precision machine learning

Is cryptojacking draining your resources and exposing your organization to financial and reputation damage risk? The rise in cryptojacking, which is an illegal form of mining cryptocurrency by the unauthorized use of someone’s computing resources, has reached alarming levels. According to the Google Threat Horizon report, 86% of compromised cloud instances in 2021 were used for cryptomining. That paints the picture quite clearly.


Abusing Google Sites and Microsoft Azure for Crypto Phishing

Throughout 2022, Netskope Threat Labs found that attackers have been creating phishing pages in Google Sites and Microsoft Azure Web App to steal cryptocurrency wallets and accounts from Coinbase, MetaMask, Kraken, and Gemini. These phishing pages are linked from the comment sections of other websites, where the attacker adds multiple links to the phishing pages, likely to boost SEO and drive victims directly to these pages.


Seeing into the future: six ways cutting-edge tech can help monitor sustainability

Haidrun’s CEO, Jonas Lundqvist, is featured in The Guardian explaining how blockchain supports traceability in the food supply chain: “In a food supply chain, for example, the record of a journey from farm to fork is available to monitor in real time, while the disclosure of data provides accountability for trading transactions and farming practices to support claims such as organic, freshness and superior quality.


Benefits of B2B blockchain in construction

Managing major design and construction projects involves dealing with complex supply chains and coordinating multiple stakeholders from architects and engineers to building firms, materials suppliers and accountants. It can be a major headache, compounded by an abundance of building codes, safety regulations and standards. The process is prone to inefficiencies, errors and mistrust, while there is an increasing drive to be more sustainable.