Seattle police have charged an online retailer's "shopping experience" software programmer with engineering a fraud scheme based on the movie "Office Space," in which malicious software was used to transfer a fraction of every transaction into an outside account.
Coinbase agreed to a $100 million settlement with the New York financial regulator on Wednesday over cybersecurity lapses and failure to comply with anti-money laundering guidelines that allowed criminals to use the platform for fraud, money laundering and other illicit activities.
The software risk landscape has changed – and not for the better. Malicious actors constantly evolve their tactics, techniques, and procedures (TTPs) to find new ways of infiltrating or disrupting organizations, and the software supply chain is now firmly in the crosshairs. A surge of sophisticated and diverse...
Losses from application fraud are projected to hit nearly $5 billion by 2024, an alarming number that signals identity controls are fundamentally broken. As financial institutions continue to struggle with addressing this pain point – from identity theft and synthetics to mule accounts – the good news is that...
Social engineering scams are on the rise globally. Last year, these scams increased 57% with an average lost of $1,029 USD per victim. Aside from the inability of legacy fraud controls to detect real-time social engineering, the circumstances of a scam can influence liability if the parties involved are unable to...
With rising customer expectations and increasing threats along with fast moving technology, today every company is a technology company - with security, availability, reliability, performance, and scalability their key concerns.
Organizations today need to scale applications and manage more traffic, address...
Today, 83% of internet traffic is made up of API calls, with 83% of enterprise workloads in the cloud. These statistics signal the direction not just some but all businesses must take in order to ensure they can tackle the challenges of today and be prepared for whatever the future may hold.
Meanwhile, as data...
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
Staying one step ahead of both threat actors and competitors is a tall task for Palo Alto Networks given the breadth of its cybersecurity portfolio. Palo Alto Networks has committed to having best of breed features and functionality in each of the technology categories where it chooses to play.
Apple is advancing plans to allow Europeans to access third-party app stores via their iPhone and iPad, as will soon be required under European law. What this means in practice for its vaunted walled garden security model, and whether most users will bother, remains unclear.
Ngrok has closed a $50 million Series A round to provide enterprise-grade authentication and user and session observability without adding complexity for developers or users. Ngrok will use the proceeds to support additional authentication protocols and build out integrations and connections.
Snyk hauled in nearly $200 million just weeks after laying off 198 employees but had to slash its valuation by $1.1 billion to seal the deal. The company intends to use the Series G proceeds to enhance and expand its developer security platform through both organic investments and acquisitions.
Approov has landed a new CEO to help the mobile security upstart expand in the United States and capture more healthcare and financial services customers. The Silicon Valley-based company has captured high-profile European customers such as BMW from its development center in Scotland.
The traditional application development model that puts security checks at the end of the process creates needless friction that slows down organizations, says Snyk solutions engineer Matt Mintzer. Application security specialists need to build tracks rather than guardrails for development, he says.