Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Criminal Threat Actor Uses Stolen Invoices to Distribute Malware

Researchers at IBM X-Force are tracking a phishing campaign by the criminal threat actor “Hive0145” that’s using stolen invoice notifications to trick users into installing malware. Hive0145 acts as an initial access broker, selling access to compromised organizations to other threat actors who then carry out additional cyberattacks.

Money 20/20 Marks Major Inflection Point in Stablecoin Utility

This year’s Money 20/20 event brought industry leaders together to discuss the latest in payments and fintech. Many conversations at the event underscored certain key trends that are rapidly shaping the payments landscape. The shift in the types of conversations around stablecoins happening today is undeniable – the question has moved beyond “Why stablecoins?” to “How do we do this today?” Here are three major takeaways from this year’s event.

Fireblocks Deepens Collaboration With the TON Foundation: Introducing Support for Jettons and $200k Grant Program

Secure access to the latest blockchains and their features is a core focus at Fireblocks, thereby empowering our customers to take advantage of new market opportunities and enhance their offerings. In the past year alone, we’ve added support for over twenty new blockchains, helping thousands of digital asset businesses to grow their revenue and expand their reach.

SAML vs. OAuth: What's the Difference?

The main difference between Security Assertion Markup Language (SAML) and Open Authorization (OAuth) lies in their roles: SAML focuses on authentication, while OAuth is dedicated to authorization. Despite their differences, both SAML and OAuth are necessary for improving your organization’s overall security, allowing authorized users to verify their identities and access appropriate resources.

What is MITRE D3FEND?

Being a security analyst today is hard. You’re constantly trying to protect your organization while feeling like attackers are always a step ahead of you. Every year, you seem to add more security technologies to your stack, yet you still find yourself facing tooling gaps. If only you had the ability to clearly compare different products and their capabilities, you think.

The Top 4 Industry 4.0 Challenges and How SASE Helps Manufacturers Overcome Them

Industry 4.0 is bringing technological and innovative advantages to the manufacturing industry. AI, IoT, and RPA, for example, are transforming and streamlining the design, production and distribution of products. But these advancements also bring new challenges for manufacturers. This blog post highlights four of the most prominent ones—based on real experiences from Cato’s manufacturing customers—and how SASE helps tackle them head-on.

Celebrating growth and recognition for our channel partner program

At Tines, we’re proud to say we're partner-first. That means we collaborate closely with partners to deliver best-in-class workflow orchestration and automation, and empower customers to tackle their biggest security and IT challenges. In 2024, we took things a step further by introducing several new AI innovations - Automatic Mode, the AI Action, and Workbench - that enable us to power even more of the world’s most important workflows.

How New CyberArk and Wiz Integrations Enhance Multi-Cloud Security

The adoption of cloud technology has transformed how organizations develop, deploy and oversee internal and customer-facing applications. Cloud workloads and services create efficiencies and introduce new access challenges. Multi-cloud environments—where organizations utilize services from multiple cloud solution providers (CSPs) like AWS, Google Cloud and Azure—offer exceptional flexibility and resilience but also present significant security challenges.

LLM Risks: Chaining Prompt Injection with Excessive Agency

Alongside an explosion in the popularity of large language models (LLMs) across many industries, there has also been an increase in the level of trust granted to these models. Whereas LLMs were once perceived as simple, friendly chatbots that could respond to basic questions or pull useful resources from the web based on user input, many have now been granted the ability to perform actions, anywhere from sending an email to deploying code. This is referred to as agency.