Hackers are draining millions of dollars from decentralized finance protocol Euler Finance in an ongoing attack. The theft of crypto funds worth $197 million marks the largest exploit in 2023 so far. Euler Finance said it is aware of the incident.
One top venture capitalist says the second-largest bank failure in U.S. history will make it harder for security startups to get loans and credit lines. For decades, SVB was one of the few institutions willing to extend money to early-stage firms that got the cold shoulder from traditional banks.
Every week, ISMG rounds up cybersecurity incidents in the world of digital assets. Between March 3 and March 9, Tender.fi paid a white hat reward to a thief, a Uranium Finance hacker began to launder stolen funds, Algodex revealed security breaches and BitKeep was working to reimburse hack victims.
The economic downturn has laid bare just how much of a disaster special purpose acquisition companies have been for the cyber industry. Despite this, confidential computing security vendor Hub decided to try its luck with a SPAC. So far, Hub's time on the Nasdaq Stock Exchange hasn't gone well.
Arctic Wolf has expanded its security operations platform into threat intelligence, incident response and cyber insurance, says CEO Nick Schneider. The company has focused on putting businesses in the best possible position to answer questions from insurance carriers following a security incident.
Open source vulnerabilities are on the rise, as are the number of malicious packages published in registries such as npm and rubygems. This is great news for threat actors, who are always quick to exploit new material. And as the importance of software supply chains increases, so have the number of attacks launched at...
Open source components play a huge part in the products, software, and applications that organizations create, by providing the core code for their output. It’s a trend that continues to grow, as the use of these components escalates. Consequently, the issues of open source licenses and compliance simply can’t be...
As a foundational element of the digital world, applications are increasingly targeted by threat actors. To adapt to the constantly evolving threat landscape of today’s digital world, IT and security leaders need to build a modern AppSec strategy designed to support demanding development cycles while also ensuring...
When WTW’s ICT business began to investigate Software Composition Analysis (SCA) tools in 2018, its challenges revolved around open-source licensing for its enterprise products designed for the insurance industry. “Copyleft” licenses represented an area of particular concern for WTW’s legal teams.
After...
Platform players such as Cisco and Palo Alto Networks and pure-play vendors such as Lookout and Versa Networks top the first-ever vendor evaluation of the SASE market. Versa edged out Palo Alto Networks in product leadership, and Cisco was a distant third, the KuppingerCole Leadership Compass found.
Technologists were quick to point out that popular AI-based chatbot, ChatGPT, could lower the bar for attackers in phishing campaigns and even write malware code, but Cato Networks' Etay Maor advises taking these predictions "with a grain of salt" and explores the pros and cons of ChatGPT.
The move to cloud email has allowed companies to streamline security investments and leverage the native Microsoft functionality provided by Exchange Online Protection (EOP) and Defender for Office 365 (MDO). But this approach isn’t perfect, and many companies have realized that they need an additional layer of...
The Royal ransomware group targeting critical infrastructure in the United States and other countries is made up of experienced ransomware attackers and has strong similarities to Conti, the infamous Russia-linked hacking group, according to a new alert issued by U.S. authorities.
Threat actors actively targeting multinational clients of data center outsourcers and help desk providers in China and Singapore are posting stolen credentials for sale on data leak sites, and cybersecurity firm Resecurity says these actions could be part of a nation-state cyberespionage campaign.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.