Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Shielding against FASTCash ATM fraud: How INETCO BullzAI secures banking networks

On October 15, 2024, a new Linux variant of the notorious FASTCash malware was uncovered, once again highlighting the vulnerabilities in global banking systems. This malware, attributed to North Korean threat actors, has been responsible for siphoning millions of dollars from ATMs worldwide by compromising interbank payment switches. The latest version targets Linux systems, allowing attackers to manipulate transaction messages and approve fraudulent cash withdrawals.

SafeBreach Coverage for US CERT AA24-290A (Iranian Cyber Actors)

On October 16th, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) issued an urgent advisory warning security teams about the use of Brute Force and other techniques by Iranian threat actors to compromise critical infrastructure ent

Scalable Security & DevSecOps with Calico's Network Policy Model for Microsegmentation

In today’s fast-paced cloud-native world, scaling security alongside rapid development cycles presents significant challenges. As organizations increasingly adopt Kubernetes, ensuring consistent, fine-grained security across dynamic workloads becomes essential. Calico’s policy model for microsegmentation offers a scalable solution that integrates seamlessly into DevSecOps workflows, enabling teams to implement robust security controls without compromising agility.

Can You Erase Your Digital Footprint?

No, you cannot erase your digital footprint, but you can reduce it by deleting inactive accounts, opting out of people search sites and adjusting your privacy settings. Your digital footprint is a collection of data left behind by your unique online activity, ranging from what you post on social media to what you browse on the internet.

How to Easily Generate An Accurate SBOM with Black Duck SCA | Black Duck

Did you know that open source code constitutes up to 95% of the code in your applications? This creates a web of dependencies that can pose security, quality, and compliance risks. Watch the video to streamline your SBOM generation process and take control of your software supply chain. Black Duck provides a solution by helping you generate an accurate software bill of materials (SBOM) in minutes, giving you visibility into your software supply chain.

AI-Enhanced Cyber Attacks Top the List of Potential Threats Facing Data Security

AI is quickly becoming the basis for more cyber attacks, leading organizations to realize the risk it presents. A new report now shows that AI-enhanced cyber attacks are now the top concern of security leaders. I recently wrote about how prolific ransomware attacks are and what the outcomes were for those experiencing attacks. In the same report - GetApp’s 2024 Data Security report – I also found some interesting data around where AI sits in the list of concerns for cybersecurity leaders.

Happy NIS2 Day...or is it? Navigating the shift from NIS to NIS2 and how to support long-term compliance

As digital transformation accelerates, so do the cybersecurity risks, particularly for organisations handling critical infrastructure and sensitive data. To address these challenges, the European Union has updated its cybersecurity regulations with NIS2 (Network and Information Security Directive 2), expanding and strengthening the original NIS Directive, which was established to improve cybersecurity across essential sectors.

CIO POV: Building Trust in Cyberspace

Trust lies at the heart of every relationship, transaction and encounter. Yet in cyberspace—where we work, live, learn and play—trust can become elusive. Since the dawn of the Internet nearly 50 years ago, we’ve witnessed incredible digital transformations paired with increasingly formidable threats. Knowing who and what to trust has become so difficult that the very notion of trust has been flipped on its head.

Evolution of Scalper Bots Part 4: New Bot Tactics vs. Anti-Bot Tools and Legislation

Welcome back to our Evolution of Scalper Bots series. In our last post, we explored how scalper bots expanded into new markets from 2010 to 2014. We saw the scalper bot industry rise and a technological arms race begin between developers and retailers. As we delve into the period of 2015 to 2017, this battle intensifies. Scalper bots become more sophisticated, retailers implement new countermeasures, and legal challenges emerge.