Philip Martin, CSO at Coinbase, discussed the unique security challenges faced in the crypto exchange landscape and shared proven strategies developed while safeguarding billions in digital assets at Coinbase.
Security operations are evolving—and they have a lot to gain from the principles of modern software engineering. GitOps, a development-centric approach that leverages version control and automation, is now reshaping how security teams operate: with speed, consistency, and transparency.
This video shows how to update NAKIVO Backup & Replication deployed on a Synology NAS. The walkthrough covers updating the full solution (Director and Transporter) and the Transporter component only.
Explore how to migrate Microsoft 365 backups from a SaaS repository to a cloud repository using NAKIVO Backup & Replication. Migrating backups from a SaaS repository to the cloud can help you enhance data reliability and recoverability, optimize costs and benefit from additional storage flexibility.
On April 4, 2025, The Australian Financial Review reported on a set of credential abuse attacks targeting multiple Austrian superannuation funds. These attacks were not breaches of the infrastructure of those companies, but compromises of individual customer accounts via stolen credentials. How were those customer credentials stolen?
The Network and Information Security (NIS) directive was introduced in 2016 to outline cybersecurity obligations across the EU and enable operational resilience for in-scope organizations. In 2020, the European Commission proposed the directive’s revision, which led to the formal adoption of NIS 2 in 2022. In this guide, we answer the common question of organizations impacted by the directive—What is NIS 2?
ISO 27001 is a globally recognized standard for building robust information security management systems (ISMS). The standard is closely aligned with NIS 2—a mandatory EU directive designed to fortify the cybersecurity posture of critical infrastructure among Member States. These two frameworks form a unique symbiotic relationship due to the potential overlap in the requirements and controls.
The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at slipping past endpoints and detection systems. These include using a custom CAPTCHA rendered via HTML5 canvas, invisible Unicode characters in obfuscated JavaScript, and anti-debugging scripts to thwart inspection. This blog takes a closer look at these methods to better understand how this kit is evolving and what defenders should be aware of.
Among the many threats of fraud and theft that organizations face, lookalike domains have emerged as a significant threat to online security and trust-based relationships. These domains, cleverly crafted to mimic legitimate websites, pose a serious risk to the security and trust inherent in online communications.