Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

New Latin American fraud rules demand real-time action: Is your bank ready?

With Latin America facing an unprecedented increase in claims for unrecognized credit and debit card transactions, banks and card issuers are directly feeling the impact of fraud and cyber-attacks that are growing more sophisticated by the day. Recent regulations have been implemented across Latin America to address a variety of payment fraud, including an unprecedented surge in claims of unrecognized transactions involving debit, credit and financing products.

Critical triggers to reassess your SIEM: when and why to evaluate

You wouldn’t drive a car that hasn’t been serviced in a decade. So why are you still trusting a legacy SIEM solution? The world of cybersecurity is in a constant state of flux, and your security information and event management (SIEM) needs to keep up. If you’re not regularly reassessing it, you might as well roll out the red carpet for hackers. Let’s discuss when and why you should seriously consider giving your SIEM a much-needed check-up.

What's new in Cloud SIEM Content Packs: September 2024

Implementing a security incident and event management (SIEM) system can be complex and often requires considerable expertise. Teams need to configure a variety of data sources and ensure their SIEM can scale with growing data volumes. In addition, users need time to learn the system, which can delay value realization. And SIEMs also need continuous maintenance to ensure threat intelligence, detection rules, and integrations are up to date.

Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities

Crystal Rans0m is a previously undocumented hybrid ransomware family developed in Rust programming language seen for the first time in the wild on September 2nd, 2023. Interestingly, it does not only encrypt victim’s files, demanding a ransom for their release, but also steals sensitive information from the infected systems. This dual-threat approach means that attackers can double their leverage over victims, potentially increasing their chances of monetizing their attacks.

How Wallarm API Security Platform Works: Key Features Explained #apisecurity #cybersecurity #api

Get an inside look at how the Wallarm API Security Platform operates to protect your APIs. Learn about its key features, including API Discovery, real-time protection, and traffic analysis, and how it helps you stay ahead of API threats.

A CISO'S View on Building an API Security Program in 2024

Building a robust API and application security program is essential for security leaders across all industries. However, creating and maintaining an effective security strategy for your APIs and web applications requires: Identifying the right components to build a program that aligns with your business objectives.

Twilio Breach: 33M Phone Numbers Exposed #apiattacks #apisecurity #dataleaks #databreach #twilio

A major security breach at Twilio exposed 33 million phone numbers due to an unauthenticated API. Watch this video to understand the risks and learn essential API security practices to protect your organization from similar threats.

Total Economic Impact of BlueVoyant Managed Detection and Response (MDR) Services

In today's increasingly hostile threat landscape, organizations are grappling with a lack of resources and overworked security operations teams, making effective, full-coverage threat detection and response a significant challenge. BlueVoyant Managed Detection & Response provides a cloud-native solution that offers end-to-end consulting, implementation, and managed security services with 24x7 security threat detection and response.

From Zelle to Your Wallet: The Mechanics of Third-Party Phishing

Over the past year, BlueVoyant’s cyber threat analysts have identified a significant rise in third-party phishing tactics, most notably with a campaign impersonating the Zelle digital payment service. By mimicking a well-known payment site like Zelle, threat actors can evade detection more effectively while collecting credentials and personally identifiable information (PII) from online users of hundreds of financial institutions.