Attack Surface Management vs. Vulnerability Management

April 3, 2024 at 07:51AM Attack surface management (ASM) and vulnerability management (VM) are often confused but differ in scope. VM uses automated tools to identify and prioritize security issues on known assets, while ASM focuses on detecting all digital assets and minimizing exposure to prevent exploitation. Used together, they create a more comprehensive cybersecurity … Read more

Fake Leather wallet app on Apple App Store is a crypto drainer

March 11, 2024 at 10:58AM The Leather cryptocurrency wallet developers warned of a fake app on the Apple App Store, labeled as a wallet drainer, targeting users to steal their digital assets. The app impersonates the genuine product, prompting users to enter their secret passphrases and subsequently draining their wallets. Despite reports, the app remains … Read more

Police seize record 50,000 Bitcoin from now-defunct piracy site

January 31, 2024 at 05:37PM German police in Saxony have seized 50,000 Bitcoins from the former operator of movie2k.to, worth over $2.1 billion, marking a record figure in the country’s law enforcement. The platform faced legal challenges and was linked to piracy. The suspects voluntarily transferred the Bitcoin to the authorities, and the final decision … Read more

Kroll reveals FTX customer info exposed in August data breach

December 28, 2023 at 01:08PM Risk and financial advisory company Kroll has revealed details about the August data breach, exposing personal info of FTX bankruptcy claimants, including coin holdings. Kroll cautioned affected individuals about potential phishing attacks and recommended security measures, such as not sharing personal info and storing crypto in cold wallets. The breach … Read more

Maximize Cybersecurity Returns: 5 Key Steps to Enhancing ROI

November 21, 2023 at 10:04AM Organizations need to be proactive in defending against evolving cyber threats. The traditional approach of protecting the on-premises data center is no longer effective as more data is moved to the cloud. To maximize the value of cybersecurity investments, organizations should define objectives, conduct risk assessments, align cybersecurity goals with … Read more

Navigating Tech Risks in Modern M&A Waters

November 10, 2023 at 10:03AM Executives need a profound understanding of cyber, data, and technology risks in today’s business landscape, especially during mergers and acquisitions (M&A). The significance of cybersecurity during M&A due diligence lies in evaluating the target company’s cybersecurity posture. Intangible assets, specifically digital assets, hold substantial value but are susceptible to breaches … Read more

Kaspersky Launches Specialized Security Solution for Containerized Environments

October 16, 2023 at 06:27PM Kaspersky has launched Kaspersky Container Security (KCS), a full-featured solution for containerized environments. KCS provides security for containerized applications during development and runtime, offering protection from cyber incidents. It consists of three main components: KCS scanner, KCS agent, and KCS server. KCS easily integrates into DevSecOps frameworks and helps ensure … Read more