Tag

Information Security

Can We Stay Ahead of Cyber Threats with Competitions Like Pwn2Own?
Cyber Security
Can We Stay Ahead of Cyber Threats with Competitions Like Pwn2Own?

The first day of Pwn2Own Ireland 2024 offered a glimpse into the dynamic and challenging world of cybersecurity, revealing 52 zero-day vulnerabilities and doling out $486,250 in rewards. This remarkable event, organized by Trend Micro in Cork, exemplifies the speed at which technological threats are accelerating and underscores the critical role of proactive cybersecurity measures. As modern technology becomes increasingly

Read More
Is Evasive Panda’s CloudScout Escalating Cyber Threats on Cloud Services?
Cyber Security
Is Evasive Panda’s CloudScout Escalating Cyber Threats on Cloud Services?

In a stunning revelation, cybersecurity researchers have exposed a sophisticated cyber espionage campaign orchestrated by a China-linked threat actor known as Evasive Panda, which specifically targets Taiwan and Hong Kong. The group, notorious for its evolved attack strategies, has now deployed a newly discovered post-compromise toolset called CloudScout to steal session cookies from various cloud services, most notably Google Drive,

Read More
Can Cyber Guru’s $25M Boost Transform Cybersecurity Training?
Cyber Security
Can Cyber Guru’s $25M Boost Transform Cybersecurity Training?

Cyber Guru, a Rome-based cybersecurity training and awareness platform, has successfully raised $25 million in a Series B funding round led by Riverside Acceleration Capital and supported by Educapital and existing investor P101. This significant investment positions Cyber Guru to enhance its cybersecurity offerings and expand its market reach across Europe. Founded with the mission to tackle human vulnerabilities in

Read More
Windows Kernel Vulnerable to OS Downgrade Attacks, Researchers Reveal
Cyber Security
Windows Kernel Vulnerable to OS Downgrade Attacks, Researchers Reveal

A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks. “This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network activity, maintain stealth, and much more,” SafeBreach researcher Alon Leviev said in

Read More
Are Your NVIDIA Drivers Updated to Prevent Security Vulnerabilities?
Cyber Security
Are Your NVIDIA Drivers Updated to Prevent Security Vulnerabilities?

NVIDIA has issued a critical security update for its GPU Display Driver, addressing multiple vulnerabilities that pose significant risks such as remote code execution, privilege escalation, and data tampering on Windows and Linux systems. The driver facilitates essential communication between the operating system and NVIDIA graphics cards, enabling complex graphical tasks. Regular updates are thus pivotal for maintaining optimal performance

Read More
Is Socios.com Leading the Way in Blockchain Sports Fan Engagement?
Fintech Blockchain
Is Socios.com Leading the Way in Blockchain Sports Fan Engagement?

In a significant development for the blockchain industry, Socios.com, a blockchain-based fan token and engagement platform, has recently achieved a major regulatory milestone by securing in-principle approval from the Malta Financial Services Authority (MFSA). This approval allows Socios.com to legally operate within the Maltese market under a Class 3 Virtual Financial Assets (VFA) license. Founded by the Chiliz Group, Socios.com

Read More
Can Kraken’s Ink Revolutionize the Future of Decentralized Finance?
Fintech Blockchain
Can Kraken’s Ink Revolutionize the Future of Decentralized Finance?

Kraken, one of the pioneering cryptocurrency exchanges, is gearing up to introduce its own blockchain platform, "Ink," at the beginning of next year. Ink is designed to support an array of decentralized applications (dApps), aiming to facilitate token trading, borrowing, and lending activities without the need for any intermediaries. Inspired by the success of decentralized finance (DeFi) platforms like Coinbase’s

Read More
How is Bitget Wallet Transforming Blockchain Gaming with Catizen?
Fintech Blockchain
How is Bitget Wallet Transforming Blockchain Gaming with Catizen?

In the rapidly evolving world of Web3, Bitget Wallet has emerged as a significant player, particularly through its influential role in the blockchain gaming sector. As the leading non-custodial Web3 wallet, Bitget Wallet has facilitated nearly half of all CATI token claims from Catizen, a gaming initiative that operates on the TON and Mantle blockchain ecosystems. This milestone underscores Bitget

Read More
Embedded Finance Revolution: Integrating Financial Services Seamlessly
Embedded Finance
Embedded Finance Revolution: Integrating Financial Services Seamlessly

Embedded finance, a transformative approach integrating financial services directly into non-financial platforms, has revolutionized how users access financial products. By embedding lending, payments, insurance, and banking services within everyday applications and websites, this innovation streamlines financial transactions and management, obviating the need to navigate multiple institutions. As Application Programming Interfaces (APIs) play a crucial role in this seamless integration, they

Read More
Blockchain Brings Transparency and Trust to Sports Betting Industry
DevOps
Blockchain Brings Transparency and Trust to Sports Betting Industry

Sports betting has a rich history, evolving from in-person wagers at games to a sprawling online market worth billions. Yet, even amidst its growth, the industry struggles with major issues that undermine trust and integrity. Transparency, fairness, and security are ongoing concerns, leaving bettors wary of the platforms they use. Here, blockchain technology offers a potential remedy, promising to reshape

Read More
How Will Vietnam Lead the World in Blockchain by 2030?
DevOps
How Will Vietnam Lead the World in Blockchain by 2030?

Vietnam has unveiled its ambitious National Strategy on the Application and Development of Blockchain Technology to 2025, with a Vision to 2030, following the signing of Decision No.1236/QD-TTg by Deputy Prime Minister Ho Duc Phuc. The strategy aims to position Vietnam as a leading regional and global player in blockchain technology. The overarching objective is to build a robust national

Read More
Is Your Business Ready for the Expanding Identity Attack Surface?
IT Digital Transformation
Is Your Business Ready for the Expanding Identity Attack Surface?

In today’s rapidly evolving digital landscape, businesses are increasingly undertaking digital transformations that incorporate cloud services, Internet of Things (IoT) devices, and third-party integrations. This evolution has led to the significant expansion of the identity attack surface, making it a prime target for cybercriminals. As Chief Information Security Officer at Gathid, Craig Davies emphasizes the heightened risk of identity-related cyberattacks

Read More