Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

The Linux Kernel and the Cursed Driver

NTFS is a filesystem developed by Microsoft that was introduced in 1993. Since then, it has become the primary filesystem for Windows. In recent years, the need for an NTFS implementation for macOS and Linux has risen, and as a result, new NTFS drivers for those operating systems have been developed. This blog post presents some information about the NTFS driver for Linux and shows a bug we found in one of the filesystem’s features.

Post-CircleCI Breach, Focus on Identity Security Strategy

When news of the recent CircleCI breach broke, developers everywhere scrambled to rotate tokens and remove hardcoded secrets stored in the popular CI/CD platform to minimize their exposure. Now that the dust has settled and more details are available, we’re reexamining the CircleCI attack chain to highlight the importance of a holistic Identity Security strategy in thwarting future damaging attacks.

Union Budget 2023: How simplified KYC helps with Digital Customer Onboarding

Finance Minister Nirmala Sitharaman advocated for the simplification of Know Your Customer (KYC) processes for financial services in a Budget speech that placed a broad emphasis on technology and tech-driven solutions. She also argued for increasing the utility of the DigiLocker platform for both individuals and businesses and giving Fintech Platforms more flexibility to access India’s digital infrastructure.

Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation - Part 1

Everything started when I was researching Windows containers. It required installing Docker Desktop for Windows, and I couldn’t help but notice that there were many Docker processes. Since some of the processes were privileged, the communication between them is of particular interest, which led me to explore further. I found the processes were using named pipes for communication, and one of them was a way to forward API calls from a low-privileged user to a privileged service.

How to Secure Secrets in Multi-cloud Environments

It wasn’t too long ago that using a single cloud for some business operations was cutting-edge technology. Now the cloud is essential for accelerating growth, improving efficiency and remaining competitive. Most organizations have multiple cloud environments deployed, in addition to private cloud and on-premises environments. In fact, in a soon-to-release CyberArk survey, 85% of respondents said they would be using three or more cloud service providers by 2023.

What are the top 10 ways AI is revolutionizing fintech?

Artificial Intelligence (AI) is revolutionizing the financial services industry, known as fintech. From improving customer experience to reducing operational costs and mitigating risks, AI is having a significant impact on fintech. In this blog, we will explore the top 10 ways AI is being used in fintech.

What is Fintech as a service & the Impact of APIs on Fintech?

Fintech as a Service (FaaS) is a business model that enables companies to outsource financial technology (fintech) services to a third-party provider. This model provides companies with a more flexible and cost-effective way to access fintech services and improve their financial operations. Let’s explore the concept of Fintech as a Service and the impact of API solutions on Fintechs.

EP 20 - Hacking ChatGPT

Even if you’ve been living under a super-sized rock for the last few months, you’ve probably heard of ChatGPT. It’s an AI-powered chatbot and it’s impressive. It’s performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental.

AI Identity Verification: Top changes in Digital Verification & Onboarding

Identity verification is a critical aspect of many businesses and organizations, ensuring that the individuals accessing resources or services are who they claim to be. With the advent of Artificial Intelligence (AI), this process has become more efficient, secure, and cost-effective. In this blog, we will explore how AI is being used in identity verification and its potential benefits.

Video Verification API: The Technology Behind Video KYC

Video KYC (Know Your Customer) is a process for customer Identity verification using remote video technology. It is a secure and efficient way for financial institutions, online businesses, and other organizations to verify the identity of their customers without requiring them to physically visit a branch or office.