Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Introducing Fireblocks Key Link: A Seamless Integration for Existing Key Management Solutions

For digital asset businesses, the increased clarity in the global regulatory landscape, driven by frameworks like MiCA and DORA in the EU and from the Hong Kong SFC and Monetary Authority, has been a welcome evolution. It also means that internal and external compliance requirements are growing more complex to manage as digital asset businesses consider expansion strategies and the need to streamline operational plans.

Announcing Fireblocks Swaps and Fireblocks Token Allowance Manager

At Fireblocks, our Decentralized Finance mission is to reduce the complexity to access DeFi protocols and protect users when interacting onchain. Interest in Decentralized Finance, or DeFi, is growing rapidly. In fact, the Fireblocks DeFi suite has supported over $22B in DeFi volume in the past 90 days alone and witnessed a 110% surge in DeFi volume between the second and third quarter of this year.

Enhancing Security in Low-Code Development: Tools and Techniques

Low-code development platforms have revolutionized the way organizations build and deploy applications by enabling rapid innovation and empowering citizen developers. However, this democratization of app creation brings new security challenges that traditional security approaches struggle to address. As businesses increasingly rely on low-code solutions, automating security becomes crucial to maintain an adequate defense against evolving threats.

Machine Learning Bug Bonanza - Exploiting ML Clients and "Safe" Model Formats

In our previous blog post in this series we showed how the immaturity of the Machine Learning (ML) field allowed our team to discover and disclose 22 unique software vulnerabilities in ML-related projects, and we analyzed some of these vulnerabilities that allowed attackers to exploit various ML services.

Secure your container images with signature verification

The use of version control systems, continuous integration (CI), container services, and other tools in software development have enabled developers to ship code more quickly and efficiently. However, as organizations expand their build and packaging ecosystems, they also increase the number of entry points for malicious code injections that can ultimately make their way to production environments.

Securing the Future of Automotive Cybersecurity: The Past, Present, and Future of IoT/OT Security

The landscape of connected vehicles is evolving at a breakneck pace. From software-defined vehicles (SDVs) to autonomous driving, the automotive industry has become a nexus for innovation and vulnerability. As Ran Ish-Shalom, Chief Product Officer at Argus Cyber Security, aptly stated during a recent session: Brian Carpenter from CyberArk reinforced this, emphasising the growing complexity of managing identities across both human and machine ecosystems.

6 Best ChatGPT Alternatives

ChatGPT is widely regarded as the leading AI chatbot, but it is by no means the only one available. Depending on your particular requirements, you may find that ChatGPT isn't the best fit. While it is a versatile tool, it can sometimes lack effectiveness compared to more specialized alternatives. Therefore, exploring a variety of ChatGPT substitutes is advisable.

Revolutionizing Cyber Defense: AI-Powered Chatbots as the New Frontline against Threats

There has never been a greater need for creative solutions when cyber dangers are changing at an unprecedented rate. One of the most exciting advancements in cybersecurity is the use of AI-powered chatbots, which are rapidly becoming essential in protecting against increasingly complex assaults. These chatbots are pushing the limits of cyber defence by utilizing developments in artificial intelligence. Let's examine how AI chatbot in cybersecurity is changing the game, providing unmatched security, and influencing how digital security will develop in the future.