Tag

Information Security

North Korean hacking group RedEyes utilizes a new info-stealer called “FadeStealer”
Cyber Security
North Korean hacking group RedEyes utilizes a new info-stealer called “FadeStealer”

With the ever-increasing threat of cyberattacks from various state-sponsored hacking groups, security researchers have identified a new info-stealer being used by the North Korean hacking group RedEyes. The group, also known as APT37, ScarCruft, and Reaper, has been active for nearly a decade and is affiliated with North Korea’s Ministry of State Security (MSS). New Info-Stealer “FadeStealer” AhnLab Security, a

Read More
Cisco to Establish a Data Center for Cloud-Delivered Security in Saudi Arabia
Data Centres and Virtualization
Cisco to Establish a Data Center for Cloud-Delivered Security in Saudi Arabia

Cisco Systems, Inc., a global leader in networking, security, and enterprise solutions, has announced its plans to establish a data center for cloud-delivered security in the Kingdom of Saudi Arabia (KSA). The move aims to help organizations, both locally and regionally, in protecting their users, infrastructure, and investments against cyber threats. With the rise of digitalization and cyber threats, the

Read More
Decentralized Finance Unleashed: Bridging the Gap, Enhancing Transparency, and Revolutionizing Global Financial Systems
Fintech Blockchain
Decentralized Finance Unleashed: Bridging the Gap, Enhancing Transparency, and Revolutionizing Global Financial Systems

Decentralized finance, or DeFi, has taken the blockchain and cryptocurrency world by storm in recent years. Unlike centralized finance, or CeFi, which relies on a centralized authority to regulate and validate financial transactions, DeFi operates on a decentralized network and does not require intermediaries to execute transactions. As a result, DeFi has emerged as a promising alternative to traditional financial

Read More
The Slow Adoption of Bitcoin — Exploring the Challenges and Opportunities
Fintech Blockchain
The Slow Adoption of Bitcoin — Exploring the Challenges and Opportunities

Bitcoin has been a topic of discussion for over a decade since its inception in 2009. It is a decentralized digital currency that provides individuals and businesses with an alternative option for financial transactions. Its underlying technology, called blockchain, offers a secure and transparent way of recording and verifying transactions. Yet, despite its many advantages over traditional fiat currencies, Bitcoin’s

Read More
Unlocking the Potential of Blockchain Technology in Business
DevOps
Unlocking the Potential of Blockchain Technology in Business

Blockchain technology is a decentralized, distributed ledger that allows for secure and transparent record-keeping in a variety of contexts, from financial transactions to supply chains to voting systems. This technology is particularly suited to cases where trust is needed between parties that don’t necessarily know each other or have a pre-existing relationship. Rather than relying on a single central authority,

Read More
Resurgence of Malicious Campaign Targets Manufacturing, Commercial, and Healthcare Organizations
Cyber Security
Resurgence of Malicious Campaign Targets Manufacturing, Commercial, and Healthcare Organizations

In recent reports, eSentire TRU has reported the resurgence of a malicious campaign that targets manufacturing, commercial, and healthcare organizations. This resurgence of the campaign may indicate a new wave of cyberattacks on these sectors, and highlights the need for increased cybersecurity measures to prevent this type of attack. Threat actors involved: native Russian speakers According to eSentire TRU, the

Read More
Revolutionizing Brazil’s E-commerce: Web 3.0, Blockchain, and the Real Digital
E-Commerce
Revolutionizing Brazil’s E-commerce: Web 3.0, Blockchain, and the Real Digital

In recent years, e-commerce has seen unprecedented growth, with more and more consumers worldwide turning to online shopping. However, with this surge in demand has come a host of challenges such as delayed and inefficient payment processes, security concerns, and lack of access to financial services for underbanked populations. Enter Web 3.0 and the emergence of Central Bank Digital Currencies

Read More
Wallet as a Service (WaaS): Revolutionizing Digital Payments
Digital Lending / Digital Payments
Wallet as a Service (WaaS): Revolutionizing Digital Payments

In today’s fast-paced world, convenience and security are essential when it comes to making financial transactions. Digital payments have become increasingly popular in recent years due to their speed and convenience. However, traditional methods of handling payments are being quickly replaced by innovative payment solutions that offer enhanced user experiences and improved security measures. One such solution is Wallet as

Read More
Digital Payments, Sustainability, and Financial Inclusion: The Future of Fintech
Digital Lending / Digital Payments
Digital Payments, Sustainability, and Financial Inclusion: The Future of Fintech

The global financial landscape has undergone a remarkable transformation in recent years. The shift towards digital payment systems has changed the way we carry out financial transactions, making them faster, more efficient, and accessible to a wider range of consumers. As more and more people opt for contactless and online payments, the use of physical cash is steadily declining, and

Read More
Project Rosalind: Unleashing the Potential of CBDCs and APIs in Retail Payments
Fintech Blockchain
Project Rosalind: Unleashing the Potential of CBDCs and APIs in Retail Payments

As governments and central banks continue to explore and plan the implementation of Central Bank Digital Currencies (CBDCs), the importance of exploring their functionality and security is becoming increasingly crucial. Project Rosalind, directed by the BIS Innovation Hub London Centre, is an initiative designed to test how Application Programming Interfaces (APIs) can facilitate retail payments in CBDCs. The ultimate aim

Read More
CyberCX Experts Unveil Vulnerability in Lenovo Laptops with BIOS Locked
Cyber Security
CyberCX Experts Unveil Vulnerability in Lenovo Laptops with BIOS Locked

Cybersecurity experts at CyberCX have recently discovered a vulnerability in older Lenovo laptops with a locked BIOS. This discovery has raised concerns about the security of personal data stored on abandoned or discarded laptops. In this article, we will explore this discovery in detail and discuss preventive measures to ensure maximum security. Methods to bypass BIOS password During the discovery,

Read More
Introducing Intent-Based Networking: The Solution to Simplify and Accelerate 5G Deployments
Networking
Introducing Intent-Based Networking: The Solution to Simplify and Accelerate 5G Deployments

The world of telecommunications is constantly evolving. As the use of technology and communication increases, so does the complexity of managing networks. Managing multiple vendors, devices, and services all at once can be challenging, time-consuming, and costly. The introduction of 5G technology brings a new level of complexity to network operations, making it harder for operators to meet the needs

Read More