Categories: Cyber Security News

Resonance Security Launches Harmony to Monitor and Detect Threats to Web2 and Web3 Apps

Quick take:

  • Harmony is the fourth cybersecurity application Resonance developed to address the disconnect in cybersecurity practices.
  • Harmony captures continuous snapshots of the web state including DNS records and scripts.
  • It also utilises artificial intelligence to assess results and eliminate false positives, thus minimising research work for both the customer and the Resonance incident response team.

Resonance, a full-spectrum cybersecurity firm building security solutions for Web2 and Web3 apps has launched Harmony.

The asset monitoring tool allows IT teams, organisations, startups and entrepreneurs to make strong detective and preventive measures accessible at any technical level. 

This is Resonance’s fourth in-house cybersecurity application. It is part of the security firm’s tech stack of more than 30 integrated tools into one platform to focus on end-to-end, “full spectrum” cybersecurity.

The launch comes just two months after Resonance raised $1.5 million in pre-seed funding as it seeks to address the root cause of cybersecurity breaches across both Web2 and Web3 including CDN Hijacking, BGP Hijacking, and DNS manipulation.

According to a report by Web3 bug bounty platform Immunefi, most exploits that Web3 projects and non-Web3 institutions face target traditional Web2 infrastructure, with 46.5% of all hacks in 2022 in monetary terms supporting this argument.

Software reviews and education company, G2 also estimates that every organisation faces about 7.5 DNS attacks a year, leading to application outages in 82% of businesses with 29% of those cases resulting in data theft.

Because exploits targeting dApps attack the Web2 infrastructure that dApps connect to, including domain name systems, routing tables that direct web traffic, and content delivery networks, weaknesses in these Web2 systems can still cause vulnerabilities even when dApps are built securely.

Harmony addresses this vulnerability by capturing continuous snapshots of the web state, including DNS records and scripts. The tool also utilises AI to assess results and eliminate false positives, thus minimising research work for both the customer and the Resonance incident response team.

“Releasing this new tool demonstrates Resonance’s dedication to a research-driven cybersecurity approach. The goal is to keep any organization’s cybersecurity strategies in tune with continuously evolving cyberattacks.

This highly effective monitoring and prevention tool is a game changer for projects trying to avoid DNS takeovers and keep their sensitive assets from being exposed to black-hat hacking groups,” Resonance founder and CEO Charles Dray shared in a statement.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. …

14 hours ago

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase widely…

14 hours ago

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…

16 hours ago

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…

17 hours ago

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one notable…

17 hours ago

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…

17 hours ago