Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Follow the Crypto Part 1: Why Fraud Teams Should Investigate Crypto Transactions

Nowadays, cryptocurrency is a buzzword in society. It’s mostly seen as a high-risk investment or associated with fast profit-making schemes. Despite this, its adoption has surged in recent years, and according to crypto.com, the number of cryptocurrency holders has now hit 580 million. Unfortunately, not all of them hold it for legitimate reasons. We are at a juncture where criminals have the knowledge, services, and tools to channel their illicit profits through cryptocurrencies.

CVE-2024-6387 - Shields Up Against RegreSSHion

On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability is nicknamed “regreSSHion” because the root cause is an accidental removal of code that fixed a much earlier vulnerability CVE-2006-5051 back in 2006. The race condition affects the default configuration of sshd (the daemon program for SSH).

What is Access Control Management and Why Is It Important?

One of the most important aspects of modern cybersecurity is managing access to IT systems and data. Indeed, organizations that lack robust access management are putting a lot on the line, from customer trust to business revenue. This article explains access control management, explores its key components, and provides best practices for implementation.