"Cybersecurity specialists at Kudelski Group carried out an audit of IOHK’s Icarus code base over the summer. The resulting written reports submitted to our Bourbaki team have been thorough and intelligible, and have enabled IOHK’s engineers to address the issues identified in an efficient way“.
“The Kudelski Security team played an important role in auditing every aspect of our smartcard wallet code. With their defense-in-depth approach to security, they provided in a timely and professional way, the adequate defenses to deliver our solution to the market with confidence”
Recent headline-making shopping bots may have CISOs asking “Is our business at risk of a targeted bot attack?” and “What can I do to prevent it from happening to us?” Nike and Sony are not the first, nor will they be the last, brands to experience reputational damages due to a successful shopping bot attack....
Multiplier.Finance operates a system known as “Multi-Chain Lend.” Multi-Chain (Lend) is an algorithmic money market system designed to bring secure and unique lending and borrowing opportunities
Hyperconnectivity of OT, ICS and SCADA environments has created an overlap between IT and OT environments, exposing formerly segmented systems to much wider attack surfaces. CISOs operating in newly or soon-to-be converged IT/OT environments, therefore, have a new charge — to integrate OT security into their existing security programs. It’s critical, however, that security...
At Kudelski Security, we perform quite a few security and cryptography reviews involving Rust code. Rust support in tooling has been lacking. We’ve developed some
ING (Dutch bank) recently released their own implementation of the popular Gennaro-Goldfeder’18 Threshold ECDSA signature scheme in the form of a library written in Rust.