Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Complete Guide to Fintech Cloud Security

With the pace of growth in financial services accelerating, fintech is, in real terms, the new normal, not the new disruptor. Cloud technology has fueled this revolution, equipping companies with tools that can be scaled quickly in response to customer demands and market needs, and enabling cost savings that can be passed on to these customers.

What is the Ideal Penetration Testing Frequency for You?

Security testing hasn’t just fallen behind—it’s playing the wrong game in a world where product teams ship updates like software streams, testing once a year is akin to locking the doors after the party has ended. It’s not just late; it’s irrelevant. Most orgs still treat pentests like performance reviews: formal, infrequent, and disconnected from the day-to-day reality. But risk doesn’t work on an annual schedule.

Why is Fintech API Security Important in 2025

APIs (Application Programming Interfaces) are the invisible backbone of everything from mobile banking to cryptocurrency exchanges. These powerful interfaces enable transactions to become frictionless, allowing data to be shared in real-time and services to be integrated in new ways across platforms, thereby transforming the way financial services operate and delivering customer value. But that very interconnectedness that drives innovation also creates new points of risk.

And The Cloud Goes Wild: Looking at Vulnerabilities in Cloud Assets

We admit it – we’ve had our heads in the clouds recently. Since we started working with Wiz as one of their integration partners, we’ve been spending even more time thinking about cloud assets. And these assets are everywhere! Gartner predicts double digit growth across all cloud segments in 2025.

Bridging the Cyber Gap: Why Collective Resilience Starts with Empowering SMEs

Raising the bar for cybersecurity can’t happen in silos. Resilience comes from shared knowledge, mutual support, and proactive partnerships — between public and private sectors, large enterprises and small businesses, academia and industry. In this respect, joining the SOC4SME program to offer free services is not just a gesture — we’re doing it because we believe cybersecurity is a shared responsibility.

CrowdStrike Strengthens Data Security Across Endpoint, Cloud, and SaaS Applications

CrowdStrike is expanding the capabilities of CrowdStrike Falcon Data Protection and introducing a new offering, SaaS Threat Services, enabling security teams to protect sensitive data across endpoints, cloud environments, and GenAI and SaaS applications. Today’s adversaries are targeting data wherever it resides. As GenAI adoption accelerates, misconfigured applications and unsecured usage create new vectors for data exposure.

A Look Into the Secrets of MCP: The New Secret Leak Source

MCP rapidly enhances AI capabilities but introduces security challenges through its distributed architecture. Especially, the distributed nature of MCP requires a lot of NHIs and their secrets. Our research shows that MCP is a new source of leaks that already discloses real-world secrets.

Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations

In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats. Cyber threat intelligence (CTI) and threat detection have emerged as essential strategies for proactively identifying and mitigating cyber risks.

Threat Context monthly, April 2025: EncryptHub & Media Land leak

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from April about EncryptHub, EncryptRAT, and the Media Land leak.