Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation - Part 2

In the previous blog post, we described how the Docker research started and showed how we could gain a full privilege escalation through a vulnerability in Docker Desktop. In this follow-up blog post, we will show the other vulnerable functions we were able to exploit.

The Benefits of Customized Regtech Solutions for SIs and their Clients

As a service provider for obligated organizations, it is essential to understand the factors driving the need for collaboration with regtech providers. It’s not just about adopting new technology; the real potential lies in effectively addressing anti-money laundering (AML) threats and streamlining regulatory compliance. Regulators consider regtech to be critical to modernizing the financial sector and ensuring clarity in supervisory expectations.

Top Identity Verification challenges faced by regulated industries and How to overcome them

Identity verification has become an essential aspect of various industries in today’s world. With the advent of technology and the growth of the digital economy, it has become increasingly important for businesses to verify the identities of their customers, clients, and partners. However, regulated industries such as finance, healthcare, and gambling face unique identity verification challenges due to the sensitive nature of their services and the regulatory requirements they must comply with.

Cloud Identity Security: It Doesn't Taste Like Chicken

There’s a scene in the original “Matrix” movie when Neo is sitting in the grimy kitchen with the rest of the crew and eating gray, runny slop. No matter what new version of gray slop they eat, they always seem to think that it tastes like chicken. When confronted with something new, it’s a natural human trait to relate it back to something we already know.

Mobile Money Compliance: The Importance of AML Screening in 2023

Anti-money laundering (AML) compliance in the mobile money industry has become increasingly important in 2023. With the rise of mobile money transactions, regulatory bodies are ramping up efforts to combat money laundering and terrorist financing. In this infographic, we explore the technology involved in AML screening, the importance of AML compliance in the industry, and best practices for financial institutions.

The (Not so) Secret War on Discord

CyberArk Labs discovered a new malware called Vare that is distributed over the popular chatting service, Discord. Vare has been used to target new malware operators by using social engineering tactics on them. Additionally, we have found that Vare uses Discord’s infrastructure as a backbone for its operations. This malware is linked to a new group called “Kurdistan 4455” based out of southern Turkey and is still early in its forming stage.

EP 25 - Cisco CX Cloud CISO on the Language of Risk

We all accept a certain degree of risk in our lives. So, to varying degrees, we’re all operating – to use cybersecurity parlance – with an assume breach mindset. Meaning, we accept that attacks are inevitable and, as such, we focus time and effort on protecting the assets that matter most. In short, we buckle up for safety.

Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations

Identity and Access Management (IAM) in most organizations is typically provided by Access Management, Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Unfortunately, many of these solutions work independently in silos, and efforts to integrate them to work together can be patchwork at best.

Vow to safeguard digital identities from cyberattacks this Identity Management Day

As our lives become more intertwined with the digital world, cyberattacks are growing in sophistication. And since the pandemic, the prevalence of hybrid work culture has posed additional security challenges. This creates pressure for businesses to implement advanced measures to safeguard their users’ digital identities and network resources. Failing to do so not only damages an organization’s reputation, but also leads to numerous legal issues and heavy recovery costs.