Tuesday, February 25, 2025
HomeCyber Security NewsResonance Security Launches Harmony to Monitor and Detect Threats to Web2 and...

Resonance Security Launches Harmony to Monitor and Detect Threats to Web2 and Web3 Apps

Published on

SIEM as a Service

Follow Us on Google News

Quick take:

  • Harmony is the fourth cybersecurity application Resonance developed to address the disconnect in cybersecurity practices.
  • Harmony captures continuous snapshots of the web state including DNS records and scripts.
  • It also utilises artificial intelligence to assess results and eliminate false positives, thus minimising research work for both the customer and the Resonance incident response team.

Resonance, a full-spectrum cybersecurity firm building security solutions for Web2 and Web3 apps has launched Harmony.

The asset monitoring tool allows IT teams, organisations, startups and entrepreneurs to make strong detective and preventive measures accessible at any technical level. 

This is Resonance’s fourth in-house cybersecurity application. It is part of the security firm’s tech stack of more than 30 integrated tools into one platform to focus on end-to-end, “full spectrum” cybersecurity.

The launch comes just two months after Resonance raised $1.5 million in pre-seed funding as it seeks to address the root cause of cybersecurity breaches across both Web2 and Web3 including CDN Hijacking, BGP Hijacking, and DNS manipulation.

According to a report by Web3 bug bounty platform Immunefi, most exploits that Web3 projects and non-Web3 institutions face target traditional Web2 infrastructure, with 46.5% of all hacks in 2022 in monetary terms supporting this argument.

Software reviews and education company, G2 also estimates that every organisation faces about 7.5 DNS attacks a year, leading to application outages in 82% of businesses with 29% of those cases resulting in data theft.

Because exploits targeting dApps attack the Web2 infrastructure that dApps connect to, including domain name systems, routing tables that direct web traffic, and content delivery networks, weaknesses in these Web2 systems can still cause vulnerabilities even when dApps are built securely.

Harmony addresses this vulnerability by capturing continuous snapshots of the web state, including DNS records and scripts. The tool also utilises AI to assess results and eliminate false positives, thus minimising research work for both the customer and the Resonance incident response team.

“Releasing this new tool demonstrates Resonance’s dedication to a research-driven cybersecurity approach. The goal is to keep any organization’s cybersecurity strategies in tune with continuously evolving cyberattacks.

This highly effective monitoring and prevention tool is a game changer for projects trying to avoid DNS takeovers and keep their sensitive assets from being exposed to black-hat hacking groups,” Resonance founder and CEO Charles Dray shared in a statement.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...