This discussion emphasizes the importance of prioritizing understanding and proactive measures over relying solely on tools in addressing cybersecurity challenges. It underscores the necessity of comprehending potential attacks specific to an orga
This discussion emphasizes the importance of prioritizing understanding and proactive measures over relying solely on tools in addressing cybersecurity challenges. It underscores the necessity of comprehending potential attacks specific to an orga
In the digital age, stolen credentials have become a significant threat to enterprise security. These credentials, often harvested from various attack and breach databases, pose a critical risk to organizations worldwide. This blog explores wher
Despite comprehensive security practices aimed at mitigating vulnerabilities, ransomware attackers continue to achieve significant breaches by targeting a small fraction of critical CVEs. This blog explores the focus on these high-risk vulnerabi
This content addresses two critical security breaches in decentralized systems. Firstly, it discusses how attackers exploited vulnerabilities in the governance token system of a decentralized autonomous organization (DAO) called The DAO. By acquir
This blog offers insights into a hacker's perspective on defensive measures and concerns regarding detection and response capabilities. The speaker emphasizes the importance of monitoring for suspicious activities and implementing effective coun
we will explore essential operational capabilities necessary for ensuring the security and integrity of decentralized finance (DeFi) platforms. Among these capabilities is the ability to blacklist wallets, transfer funds, and pause or terminate
we will explore three recent incidents in the crypto space and personal experiences to extract valuable lessons that can help reduce the frequency of such events. While these incidents can be intriguing and sometimes exciting, it is in everyone's
Welcome to the CISO Platform "Best of the World" Security Webinar Series, a premier event featuring the world's leading cybersecurity minds. This series presents security content that is often hard to find and understand, featuring notable exper
This blog delves into two critical aspects of decentralized finance (DeFi) security: the manipulation of liquidity pools and the importance of proper validation in algorithmic decision-making. By examining a specific case of liquidity pool exploit
This blog explores the critical features and capabilities of GameFi contracts, focusing on security measures designed to protect user funds. By implementing options such as wallet blacklisting, pausing contracts, and escape mechanisms, GameFi plat
In late March, a significant incident involving the ERC-20 token Nua took place. This event was a price Oracle manipulation attack, exploiting vulnerabilities in the DeFi protocol's pricing mechanism. The attacker manipulated the liquidity pool bala
In the realm of cybersecurity, the quest for the best antivirus to shield against ransomware remains a paramount concern for organizations worldwide. While antivirus software plays a crucial role in detecting and mitigating threats, it's essential
In today's webinar, we embarked on a journey through the evolving landscape of cybersecurity threats, focusing on the surge of ransomware attacks and critical vulnerabilities affecting organizations worldwide. Led by Jendra Chan, Head of Research
Welcome to a comprehensive exploration of critical vulnerabilities that demand immediate attention from cybersecurity professionals worldwide. In this discussion, we delve into the intricacies of vulnerabilities affecting widely used technologie
Welcome to a deep dive into the ever-evolving landscape of ransomware threats and the critical CVEs that serve as gateways for cyber adversaries. In this exploration, we unravel the tactics employed by ransomware actors and the imperative need fo
Welcome to the forefront of cybersecurity defense, where vigilance and proactive measures are paramount in safeguarding against ransomware attacks. In today's discussion, we delve into the intricate strategies employed by ransomware actors to ex
Greetings, esteemed members of the CISO Platform, a beacon of knowledge and collaboration in the realm of information security. Today, we embark on a journey to dissect the modus operandi of ransomware attackers and shed light on their sophisticat
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…