Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blockchain

Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes

PostgreSQL is a powerful, open-source relational database management system (RDBMS). Because of its robustness and scalability, PostgreSQL is used extensively in the cloud. Most public cloud providers including AWS, Azure and GCP provide database services to their customers based on PostgreSQL.

ABN AMRO Issues First Digital Bond with Fireblocks

ABN AMRO, headquartered in Amsterdam, became the first bank in Europe to register a digital bond on the public blockchain, using Fireblocks. The digital bond was issued to a select group of investors to raise funds on behalf of APOC, an ABN AMRO commercial client in the aerospace industry. ABN AMRO’s bond issuance sets an innovative precedent in bringing more real world use cases of blockchain technology to traditional financial markets.

How to detect Crypto Mining with Sysdig Secure

Detecting a crypto (bitcoin, monero, etc.) miner malware is essential to prevent a cryptojacking attack. Learn how to detect and prevent these mining attacks! Cryptojacking is a cybercrime in which another party’s computing resources are hijacked to mine cryptocurrency.#CryptoJacking, which is also referred to as malicious cryptomining, lets hackers mine crypto currency (like bitcoin, monero, ethereum, etc.) without paying for electricity, hardware and other mining resources.

Who has access to your private keys?

“Not your keys, not your crypto” is a common phrase in the world of digital assets, and for good reason. Private keys are the only information required to sign transactions and move your digital assets. Because of this, only trusted individuals or third parties should have access to your organization’s private keys. But how do you ensure this stays true as you grow your business, team, and network of counterparties?

Cryptojacking Attacks See Growth Despite Weak Year for Cryptocurrency

2022 has seen a slowdown for the cryptocurrency ecosystem, as well as a decrease in demand for cryptocurrency-related activities like cryptomining. Even before the catastrophic implosion of the FTX cryptocurrency exchange, multiple market bubbles (from failed exchanges other than FTX) and events like Ethereum’s highly anticipated transition from proof of work to proof of stake have dampened enthusiasm for cryptocurrencies.

Hackathon! How can blockchain solve supply chain visibility challenges?

PA Consulting recently joined forces with RKVST to host a Hackathon, looking to identify new and innovative propositions for digital supply chains. Could the teams of PA consultants and analysts identify opportunities to help their clients using RKVST technology? Short answer: YES! Many of today’s business challenges can be addressed with a reliable evidence ledger. If you want the long answer, read on.

The blockchain & data privacy (GDPR)

Blockchain has been outlined as a digital, decentralized ledger that keeps a record of all transactions that present itself across a peer-to-peer network. It permits the secure transfer of assets while not being an associate mediator. It conjointly provides a record of transactions that's absolutely clear and displayed in time period for the good thing about participants.