Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Key considerations for digital asset startups: Custody and beyond

Blockchain technology continues to grow in prominence, and as it expands, a wide range of businesses are looking to develop digital asset products. At the same time, many startups are launching with digital assets at the center of their businesses. If you are running a digital asset business or building a blockchain product, it’s important to consider what type of custody management solution will best support your business.

Cloudy with a chance of breach: advanced threat hunting strategies for a hyperconnected and SaaSy world

When workloads moved to the cloud, a huge burden was lifted from the enterprise in infrastructure and operational overhead. This transition also brought with it the “shared responsibility” model, where cloud providers took on much of the responsibility previously relegated to expensive engineering teams.

How to use USB devices with a VMware vSphere virtual machine

The main function of a hypervisor is to emulate the devices used by virtual machines at the software level. Devices, such as virtual controllers, disks, DVD-ROMs, video cards, network cards, input devices, etc., are created in a virtual machine. But what if you want to connect a printer, scanner, USB flash drive, USB hard drive, USB smart card reader, security dongles, USB license keys, etc.?

Cybersecurity Sessions S03E01: "Bot's the Story, Morning Glory?" Oasis Ticket Scalper Bots

Netacea bot experts discuss the challenges around the Oasis reunion tour ticket sales, focusing on the issues caused by bots and scalping in high-demand events. The discussion explores the technical difficulties of managing ticket sales, the tactics used by bot operators to secure tickets, and the broader implications for the industry. The team also discuss why current methods to prevent bot activity often fail and why a multi-pronged strategy combining real-time detection, post-transaction analysis, and clamping down on secondary markets is critical.

Powering the future of GRC: New capabilities bring continuous visibility and automation to GRC teams

Security is a top buying requirement for businesses today. In fact, two-thirds of respondents to our State of Trust survey say that customers, investors, and suppliers are increasingly looking for proof of security and compliance. As concerns around in-house security practices, third-party tools, and access to customer data grow, customer expectations for trust continue to rise. ‍

Revival Hijack: How Abandoned PyPI Package Names Are Being Exploited to Deliver Malware

Security researchers have uncovered a novel and concerning method for cybercriminals to distribute malware using public code repositories. Known as "Revival Hijack," this technique involves the re-registration of previously abandoned package names on the PyPI repository. By taking advantage of the fact that PyPI allows the reuse of names from removed packages, attackers are able to slip malicious code into unsuspecting organizations.

Minimizing the Impact of Cloud Attacks

What does your organization have in place to minimize the damage when an incident happens? Having handled thousands of incident response cases, our experts recommend putting high quality monitoring tools in place to detect potential threats to the cloud, such as zero-day vulnerabilities, misconfigurations and insider threats and more. Watch now. Additional Kroll Research on Cloud Safety.