Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

SEBI's CSCRF Regulation

India's Securities and Exchange Board (SEBI) has introduced a new regulatory framework called the Cyber Security and Cyber Resilience Framework (CSCRF). The regulation aims to tighten cybersecurity and data governance for capital market participants. As cyber threats increase globally, the CSCRF is poised to create a stronger defense line for organizations operating in India’s capital markets.

Vanta accelerates ANZ momentum with localised frameworks, regional support, and a new Australian data centre

Managing compliance across various frameworks and standards can be challenging and confusing. Organisations must earn and maintain compliance with local and international standards and industry-specific regulations, all while keeping up with ever-evolving security and privacy best practices. This is particularly true for startups and scaleups in the ANZ region looking to accelerate growth, expand into international markets, and sell to new and larger customers with higher expectations. ‍

Detecting Microsoft Entra ID Primary Refresh Token Abuse with Falcon Next-Gen SIEM

Microsoft Entra ID Primary Refresh Tokens (PRTs) are an attractive target for threat actors because they are long-lived, they are broadly scoped and they often don’t have additional multifactor authentication requirements after they are obtained. In this blog, we will discuss what PRTs are, how they are issued and how recently released research gives threat attackers a new way to obtain them. Finally, we will examine how organizations can detect these attacks using CrowdStrike Falcon Next-Gen SIEM.

When SASE Meets DEM: Revolutionizing the User Experience

In today’s fast-evolving business world, IT Teams must ensure seamless user experiences to stay competitive. As networks grow more complex, IT faces increasing challenges in identifying and resolving performance issues that impact user productivity and satisfaction. Cato Digital Experience Monitoring (DEM) addresses these challenges, helping IT ensure optimal user experiences.

Vital Signs of Software Dependencies: Understanding Package Health

As the vast majority of modern applications rely heavily on open-source software, dealing with updates for dependencies can become a major hassle for both developers and cybersecurity professionals. Every developer knows the pain of an update breaking their application. Manually determining which dependencies to run can become a massive time-suck, which is why many developers fall behind on updates, leaving applications open to vulnerabilities.

Fireblocks Deploys Hashnote's USYC via Off Exchange

Fireblocks now enables customers to use Hashnote’s regulated tokenized money market fund, US Yield Coin (USYC), as a collateral asset on Deribit through Fireblocks Off Exchange. This significant milestone marks the first time a major crypto derivatives exchange is supporting a regulated tokenized money market fund, and the first time this type of token is being used as collateral. USYC is a cross-collateral currency on Deribit.

Fireblocks x Bitbond: Simple, Secure, and Scalable Tokenization for Institutions

Tokenization projects are making significant strides in financial markets, and beyond, by making financial and real world assets more accessible. As the market evolves, institutions require a secure and scalable solution that they can easily build and deploy. In September 2023, Fireblocks bolstered its tokenization capabilities with the acquisition of BlockFold, to provide a complete service layer of advisory, token customization, orchestration, and distribution.

AfterDarkMode Malware: What It Is and How to Mitigate the Risk

Now that AfterDarkMode malware is out there, internet threats are even more complicated and dangerous. That person who is sneaky and hard to catch has shown that they are motivated to get into systems and use weaknesses to their advantage. For businesses to be safe from the AfterDarkMode threat, they need to understand its plans, methods, and procedures and take steps to lower the risk. AfterDarkMode malware is a very advanced and sneaky threat that can take over computers without anyone noticing.

DFIR Bluesky Ransomware: Strategies for Incident Response and Threat Containment

When Bluesky ransomware first appeared, it caused a lot of trouble for businesses of all kinds. This sophisticated and dangerous threat actor has shown that they are determined to stop activities and get money by any means necessary. To mitigate the Bluesky danger, businesses need to take a thorough and proactive approach to handling incidents and keeping threats inside their borders.