Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identity Verification for Neo Banking: Ensuring Security and Compliance

In the world of finance, digital onboarding is becoming increasingly important for neo banks. Neo banking refers to a new generation of digital-only banks that offer a wide range of financial services through mobile apps and online platforms. These banks are typically built on top of existing infrastructure, and they rely heavily on technology to provide a seamless and efficient customer experience. Digital onboarding is the process of registering for and opening a new account with a neo bank.

Black Basta - Technical Analysis

In recent months, news outlets have reported a surge in double extortion ransomware attacks by Black Basta, a notorious ransomware-as-a-service (RaaS) threat group first identified in early 2022. The actor is sophisticated, often utilizing a unique set of tactics, techniques and procedures (TTPs) to gain a foothold, spread laterally, exfiltrate data and drop ransomware. However, Kroll has observed Black Basta sometimes utilizing similar TTPs across multiple incidents.

Global Survey Reveals Cybersecurity Budgets Should be Spent on Security Operations in 2023

It’s been splashed across headlines and popped up in social media statuses — organizations are evaluating budgets and laying off staff. These layoffs, which have hit departments like marketing and IT across a variety of industries, are more than anecdotal. Our global survey, which took responses from 920 decision makers at enterprises with more than 1,000 employees showed that there is a major shift happening in internal spending and hiring.

External Attack Surface Management Market Size: An Overview

Attack surface management (ASM) is becoming increasingly important for businesses today. The attack surface is expanding and becoming more complex than ever before, driven by numerous factors, including the COVID-19 pandemic and resulting shift to remote work, widespread cloud adoption and the resulting growth of shadow IT, increased use of managed services (SaaS), and third-party vendor services.

Under the Wing: Taking on Patch Tuesdays with Falcon Spotlight

Microsoft’s Patch Tuesday is dreaded by every security team. With dozens of new patches inundating your team every month, how do you know which to prioritize? CrowdStrike combines the power of our world-class machine learning and our unparalleled intelligence to arm every customer with the insight they need to prioritize patches and take action. In this Under the Wing episode, you’ll learn how CrowdStrike enables you to protect your organization with Falcon Spotlight.

The 443 Episode 226 - Report Roundup

This week on the podcast, we cover key findings from three individual reports published last week. In the first report we'll dive into the world of blockchain analysis looking for illicit transactions. In the second report, we'll cover the state of SMB security. The final report includes a discussion of overall financial crime involving stolen payment card information. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

AI and Cybersecurity: Some observational implications of the intersection between the two

There is a possibility that artificial intelligence (AI) will have a significant influence, in either a good or bad direction, on cybersecurity. On the plus side, artificial intelligence (AI) can be used to automate and improve many parts of cybersecurity. AI can find and stop threats, find strange behavior, and look at network traffic, among other things. This might be a game-changer for the industry.

Automating Kubernetes Backups with CloudCasa REST APIs

For power users who want to run their scripts from the command line or use workflow automation tools to provision their environments, watch this short tutorial on how to use the CloudCasa REST API to manage Kubernetes backups. The tutorial goes through an example of executing a CloudCasa backup job through the REST API, which requires tasks such as querying for backup job ids and invoking an action against that job through an http request.

The Ethical Hacking Guide: Hacking for Security

Companies are under more threat than ever. The rise in cyber threats is alarming: 2021 saw a 30% increase in cyberattacks compared with 2020. Even sophisticated systems with complex countermeasure technologies for security may be vulnerable to attack. Many organizations turn to hackers to counteract these threats. Ethical hackers use the tools and methods of malicious actors to help companies pinpoint their weaknesses and build a more resilient and secure system.