Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Fireblocks Deploys Hashnote's USYC via Off Exchange

Fireblocks now enables customers to use Hashnote’s regulated tokenized money market fund, US Yield Coin (USYC), as a collateral asset on Deribit through Fireblocks Off Exchange. This significant milestone marks the first time a major crypto derivatives exchange is supporting a regulated tokenized money market fund, and the first time this type of token is being used as collateral. USYC is a cross-collateral currency on Deribit.

Fireblocks x Bitbond: Simple, Secure, and Scalable Tokenization for Institutions

Tokenization projects are making significant strides in financial markets, and beyond, by making financial and real world assets more accessible. As the market evolves, institutions require a secure and scalable solution that they can easily build and deploy. In September 2023, Fireblocks bolstered its tokenization capabilities with the acquisition of BlockFold, to provide a complete service layer of advisory, token customization, orchestration, and distribution.

AfterDarkMode Malware: What It Is and How to Mitigate the Risk

Now that AfterDarkMode malware is out there, internet threats are even more complicated and dangerous. That person who is sneaky and hard to catch has shown that they are motivated to get into systems and use weaknesses to their advantage. For businesses to be safe from the AfterDarkMode threat, they need to understand its plans, methods, and procedures and take steps to lower the risk. AfterDarkMode malware is a very advanced and sneaky threat that can take over computers without anyone noticing.

Boost security for your Mac customers against MFA bombing campaigns

It all started when I began receiving multiple notifications on my Mac asking me to approve an authentication request. I ignored them at first, thinking it was a system error. But they kept popping up again and again, until they started interfering with my work. I was busy so I didn't stop to investigate. Then I received a phone call from a person claiming to be from my company's IT support team.

Vital Signs of Software Dependencies: Understanding Package Health

As the vast majority of modern applications rely heavily on open-source software, dealing with updates for dependencies can become a major hassle for both developers and cybersecurity professionals. Every developer knows the pain of an update breaking their application. Manually determining which dependencies to run can become a massive time-suck, which is why many developers fall behind on updates, leaving applications open to vulnerabilities.

44% of U.S. Organizations Experienced One or More Ransomware Attacks in the Last Year

As ransomware becomes more pervasive, new data provides insight into how well organizations are responding and the attack vector being used most. We hear a lot about ransomware attacks, but I’m not seeing data about how well organizations fared, so I was glad to see GetApp’s 2024 Data Security report. According to the report, nearly half of U.S.

How to Keep Your Data Safe in the Cloud with the Best Backup Software

When it comes to file storage, it's not just a case of storing your files in the cloud and the job’s done. You have to take more steps to protect against data loss, corruption, accidental deletion, or ransomware. Whenever you store anything, it is essential to back up your files for complete reassurance that no matter what happens to your device, you will always have a backed-up version of your files that you can recover.

Staying Ahead of The Threat Landscape with Automated Detection (Part 1)

Cybersecurity teams are seeing a strong transition toward more open and collaborative intelligence sharing. This shift stems from the recognition that no one organization can fight the multitude of threats alone. But despite this progress, a critical gap remains in post-incident intelligence sharing.

In the Face of Hurricanes and Natural Disasters, Architecture Matters for Business Continuity

Over a decade ago, when cloud-delivered security services like secure web gateway (SWG) began emerging, the focus was mainly on protecting a small segment of the workforce—remote users plus contractors, suppliers, and partners. The challenge was ensuring these off-premises users had the same security protections as those on-site, especially when endpoint agents were insufficient, impractical, onerous, or prone to being disabled!