Avatar photo

Dwaine Evans

Dwaine Evans' wheelhouse is digital wealth management. His profile features in-depth research and analysis on cyber security and platform advocates for DevOps and its revolutionary potential across various industries. Dwaine's content is geared toward industry professionals looking to make changes, which he highlights through his detailed analyses at the prospects wealth management has to offer. 
WealthKernel Fuels Expansion with £6 Million Series A Extension Round, Led by ETFS Capital
Digital Wealth Management
WealthKernel Fuels Expansion with £6 Million Series A Extension Round, Led by ETFS Capital

WealthKernel, a leading provider of digital investment services and infrastructure, announced that it has successfully secured an investment of £6 million in a Series A extension round. The round was led by ETFS Capital, with participation from other prominent investors, including XTX Ventures, the venture capital arm of algorithmic trading company XTX Markets. Funding History of WealthKernel WealthKernel’s journey to

Read More
Cybercrime Website Owner Sentenced to Time Served and Supervised Release – Controversy Surrounds Light Sentence
Cyber Security
Cybercrime Website Owner Sentenced to Time Served and Supervised Release – Controversy Surrounds Light Sentence

Conor Brian Fitzpatrick, the owner of the notorious cybercrime website BreachForums, has recently been sentenced to time served and 20 years of supervised release. This article delves into the case, shedding light on the charges against Fitzpatrick, the surprising sentencing decision, and the subsequent debate over the severity of the sentence. It also explores the activities of the BreachForums website

Read More
Callisto Network: Harnessing Decentralized Governance for a Secure and Inclusive Blockchain Future
DevOps
Callisto Network: Harnessing Decentralized Governance for a Secure and Inclusive Blockchain Future

Blockchains have revolutionized the digital landscape, enabling secure and transparent transactions across the world. However, the centralized nature of some major blockchain networks has raised concerns about security, innovation, and the democratization of decision-making. Callisto Network, with its layer-1 blockchain, offers a compelling solution through decentralized governance, community focus, and on-chain democracy. Comparing major blockchain networks that prioritize speed over

Read More
Head of U.S. Cyber Defense Agency Falls Victim to Swatting Attack – Troubling Trend Exposes Vulnerabilities
Cyber Security
Head of U.S. Cyber Defense Agency Falls Victim to Swatting Attack – Troubling Trend Exposes Vulnerabilities

The head of the U.S. cyber defense agency was the latest major political target of a swatting attack. Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency (CISA), confirmed reports on Monday regarding an incident that took place on December 30 at her Virginia residence. False calls to the police claimed a shooting had occurred, leading to a swift

Read More
LoanDepot Confirms Data Breach Impacting 16.6 Million Customers in Ransomware Attack
Cyber Security
LoanDepot Confirms Data Breach Impacting 16.6 Million Customers in Ransomware Attack

LoanDepot, one of the largest retail mortgage lenders in the United States, has recently confirmed that a significant data breach has occurred, impacting approximately 16.6 million customers. The company initially described the incident as a ransomware attack, informing the public that an unauthorized third party had gained access to sensitive personal information. Scope of breach and investigation According to LoanDepot,

Read More
Objectway’s Strategic Acquisition of Nest Wealth: An Indoctrination into the North American Market
Digital Wealth Management
Objectway’s Strategic Acquisition of Nest Wealth: An Indoctrination into the North American Market

As part of its aggressive global expansion strategy, Italian software and services provider Objectway has made a significant move by acquiring the Canadian company Nest Wealth. This strategic acquisition solidifies Objectway’s market presence in North America and allows it to offer a comprehensive range of innovative products and services to customers in both EMEA (Europe, Middle East, and Africa) and

Read More
Securing Email Accounts: Microsoft’s Response to Nation-State Threats
Cyber Security
Securing Email Accounts: Microsoft’s Response to Nation-State Threats

Email accounts have become a prime target for hackers aiming to gain unauthorized access to sensitive information. The significance of securing these accounts cannot be understated, as they serve as gateways to valuable data. Microsoft, one of the leading technology companies, recently faced a cybersecurity threat when a Russian-based hacker group targeted the email accounts of its senior executives. This

Read More
Using Robots to Fill Manpower Gaps: OTSAW’s Innovative Solution for the Healthcare Industry
Robotic Process Automation In IT
Using Robots to Fill Manpower Gaps: OTSAW’s Innovative Solution for the Healthcare Industry

In a world where industries are facing unprecedented manpower shortages, the robotics company OTSAW has been stepping up to fill the gaps. With their innovative robots, they have been revolutionizing various sectors that require extensive manpower. However, one industry, in particular, that demands substantial support is healthcare. The specific challenges faced by the healthcare industry The healthcare industry is notorious

Read More
French Anti-Cybercrime Office Intensifies Efforts Ahead of Olympics as Cyberattacks Pose a Significant Threat
Cyber Security
French Anti-Cybercrime Office Intensifies Efforts Ahead of Olympics as Cyberattacks Pose a Significant Threat

With the upcoming Olympics just around the corner, the French National Police have established a dedicated cybercrime unit known as the French Anti-Cybercrime Office (OFAC). As authorities warn of the escalating threat posed by cyberattacks, the OFAC aims to tackle online fraud and enhance intelligence sharing between French and international law enforcement agencies. This article explores the purpose and objectives

Read More
Russian Hackers Breach Microsoft’s Corporate Network, Stealing Emails and Prompting an Investigation
Cyber Security
Russian Hackers Breach Microsoft’s Corporate Network, Stealing Emails and Prompting an Investigation

A Russian government-backed hacking team, known as Midnight Blizzard/Nobelium, has successfully infiltrated Microsoft’s corporate network, compromising the security of senior executives’ emails and attachments. This cyberattack has raised concerns regarding the vulnerability of major tech companies and the need for stronger security measures. Let’s delve into the details of this breach and its implications. Russian hackers breach Microsoft’s corporate network

Read More
Crypto Venture Capital Recovery: Opportunities and Challenges for Startups in a Shifting Landscape
DevOps
Crypto Venture Capital Recovery: Opportunities and Challenges for Startups in a Shifting Landscape

The world of crypto venture capital is experiencing a recovery, and investors are seeking more liquid and growth-ready startup opportunities. After a period of uncertainty and market downturn, the crypto industry is gradually finding its footing, presenting new prospects for entrepreneurs in this space. Divergence between public and private markets As the recovery takes hold, it becomes apparent that capital

Read More
Urgent Action Required: Multiple Threat Actors Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure Products
Cyber Security
Urgent Action Required: Multiple Threat Actors Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive, urging Federal Civilian Executive Branch (FCEB) agencies to take immediate action against two actively exploited zero-day flaws in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products. These vulnerabilities, an authentication bypass (CVE-2023-46805) and a code injection bug (CVE-2024-21887), have become the target of widespread exploitation

Read More