What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

What Are DeFi Flash Loans & How To Prevent Flash Loan Attacks?

Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan attacks are a common threat that enable hackers to steal massive amounts of cryptocurrency reaching up into the hundreds of millions. By: Kiril Ivanov, Founder and Technical Lead, Bright Union What is a flash loan? A flash loan is an ultra-fast, unsecured loan, where the whole lending and returning process occurs within a single transaction on the…

Read More

Why Is It Important to Invest in OT Cybersecurity for 2022?

Why Is It Important to Invest in OT Cybersecurity for 2022?

As we enter 2022, it’s important that organizations invest in cybersecurity for their operational technology (OT) systems. Why? One of the reasons is that Industry 4.0 can sometimes introduce more risk for OT. This is evident in several Industry 4.0 market trends. For example, there’s digital twin infrastructure. That’s where you make a digital copy of your production facility or your machine. You can then simulate the stuff you want to do in the digital…

Read More

How Should Organizations Tackle Their Data Privacy Requirements?

How Should Organizations Tackle Their Data Privacy Requirements?

Data is among the most valuable assets that need to be safeguarded at all costs. But in the digitally-driven business world, cybercrimes are prevalent, making data protection and data privacy a main focal point. The increasing use of technology and the growing exposure to evolving cyber threats have dramatically changed the data security and privacy landscape. For these reasons, international regulatory bodies around the world have created stringent data privacy laws for businesses to meet….

Read More

Cybersecurity for Industrial Control Systems: Part 1

Cybersecurity for Industrial Control Systems: Part 1

Cybersecurity for Industrial Control Systems: Part 1 Ransomware In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. By: Trend Micro Research January 15, 2022 Read time:  ( words) The ever-changing technological landscape has made it possible for the business process on the IT side of an enterprise to be interconnected with the physical process on the OT…

Read More

Empowering Your Organization by Closing the Data-Centric Talent Gap

Empowering Your Organization by Closing the Data-Centric Talent Gap

Data may be the key to accelerating strategic decision-making, yet without a seasoned bench of expert talent, data is just another underutilized asset with a limited ability to impact the business, let alone the bottom line. Despite the momentum and dollars funneled to data initiatives, the lack of available talent with specialized expertise in areas such as data modernization, data science, data storytelling and visualization, AI, and advanced analytics is hampering many companies’ ability to…

Read More

A Complex Threat Landscape Muddles Attribution

A Complex Threat Landscape Muddles Attribution

A Complex Layer: The Threat Landscape While researchers have often pointed to false flags as a known roadblock in attribution, another layer adds further complexity to the equation: Attacker groups are not static. Kittner said that researchers often see individual operators linked to China, Iran or Russia, who may have been part of one APT, pop up in operations tied to another threat group, for instance. “That definitely makes it harder,” said Kittner. “We have…

Read More

Russia Stops REvil

Russia Stops REvil

Russia says it has ended the criminal activities of the REvil ransomware gang and placed its members under arrest.  In an action coordinated by the Federal Security Service of the Russian Federation (FSB) in cooperation with the Investigation Department of the Ministry of Internal Affairs of Russia in the cities of Moscow, St. Petersburg, and Lipetsk, searches were executed at residential addresses associated with 14 gang members. During the operation, Russian authorities seized computer equipment, money, and vehicles…

Read More

Delivering Business Value Through Data-First Modernization

Delivering Business Value Through Data-First Modernization

Despite the billions of dollars and countless man-hours being channeled into digital transformation, too many companies are spinning their wheels, buried in petabytes of unusable data. As a result, many are saddled with initiatives that do little to advance the strategic agenda or deliver value for the business. According to Forrester Research, companies are three times as invested in digital transformation as in other IT programs, yet progress is slow. Companies say they are still…

Read More

Russia arrests REvil ransomware gang members at request of US officials

Russia arrests REvil ransomware gang members at request of US officials

Russia’s Federal Security Service said that 14 people were arrested and millions in currency has been seized. Money that has been seized from detained hackers. At the request of the United States, the FSB has detained a group of hackers who sent ransomware viruses. The FSB said that over 426 million rubles, including in cryptocurrency, $600,000 and 500,000 euros, as well as computers had been seized in 25 apartments of 14 members of the REvil…

Read More

DigiCert Acquires Mocana

DigiCert Acquires Mocana

American technology company DigiCert has announced the acquisition of Mocana, a cybersecurity firm based in California. Mocana was founded in 2002 and is headquartered in Sunnyvale. The focus of the company is on embedded system security for industrial control systems and the internet of things (IoT). DigiCert said the acquisition will allow it to offer an end-to-end IoT platform and provide customers with a way to manage device identity, secure connections, prevent device tampering, and update firmware and settings remotely…

Read More
1 3,301 3,302 3,303 3,304 3,305 4,053