logo
Resecurity Named One of America's Fastest-Growing Private Companies by Inc. for the Fourth Year Running

Resecurity Named One of America's Fastest-Growing Private Companies by Inc. for the Fourth Year Running

Yahooa day ago
LOS ANGELES, August 05, 2025--(BUSINESS WIRE)--Resecurity®, Inc., a leading global cybersecurity and threat intelligence company, has been named to the 2025 Inc. 5000 list of the fastest-growing private companies in America for the fourth consecutive year. This recognition by Inc. Magazine highlights Resecurity's continued growth, innovation, and impact in the cybersecurity industry.
The Inc. 5000 list is a definitive ranking of the most dynamic and successful private companies in the U.S., recognizing organizations that have demonstrated strong performance amid economic uncertainty and rapid digital transformation. Resecurity's inclusion for four consecutive years reflects its unwavering commitment to delivering intelligence-driven cybersecurity solutions and helping customers navigate an increasingly complex threat landscape.
"We're honored to be recognized by Inc. for four years in a row," said Gene Yoo, CEO of Resecurity. "This achievement reflects the hard work, passion, and commitment of our global team, and our mission to help organizations stay ahead of emerging cyber risks with intelligence-driven solutions. In a constantly shifting threat landscape, our continued growth is rooted in innovation, customer trust, and strong partnerships."
Over the past year, Resecurity has expanded its presence across North America, Latin America, the Middle East, and Asia. The company continues to serve as a trusted partner to enterprises, government agencies, and financial institutions, offering advanced threat intelligence, digital risk monitoring, dark web investigations, and compliance support.
This recognition comes on the heels of multiple milestones in 2025, including the launch of AI-powered compliance automation tools, expansion into Brazil, new university and CERT partnerships, and continued presence at leading global industry events such as RSA Conference, GISEC Global, and Black Hat.
To view the complete 2025 Inc. 5000 list, visit: www.inc.com/inc5000
About Resecurity
Resecurity® is a cybersecurity company that delivers a unified endpoint protection, fraud prevention, risk management, and cyber threat intelligence platform. Known for providing best-of-breed data-driven intelligence solutions, Resecurity's services and platforms focus on early-warning identification of data breaches and comprehensive protection against cybersecurity risks. Founded in 2016, it has been globally recognized as one of the world's most innovative cybersecurity companies with the sole mission of enabling organizations to combat cyber threats regardless of how sophisticated they are. Most recently, by Inc. Magazine, Resecurity was named one of the Top 10 fastest-growing private cybersecurity companies in Los Angeles, California. As a member of InfraGard National Members Alliance (INMA), AFCEA, NDIA, SIA, FS-ISAC, and the American Chamber of Commerce in Saudi Arabia (AmChamKSA), Singapore (AmChamSG), Korea (AmChamKorea), Mexico (AmChamMX), Thailand (AmChamThailand), and the UAE (AmChamDubai). To learn more about Resecurity, visit https://resecurity.com.
View source version on businesswire.com: https://www.businesswire.com/news/home/20250805453016/en/
Contacts
Shawn Lovelandpress@resecurity.com
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT
A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT

WIRED

timea minute ago

  • WIRED

A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT

Aug 6, 2025 7:30 PM Security researchers found a weakness in OpenAI's Connectors, which let you hook up ChatGPT to other services, that allowed them to extract data from a Google Drive without any user interaction. Photo-Illustration:The latest generative AI models are not just stand-alone text-generating chatbots—instead, they can easily be hooked up to your data to give personalized answers to your questions. OpenAI's ChatGPT can be linked to your Gmail inbox, allowed to inspect your GitHub code, or find appointments in your Microsoft calendar. But these connections have the potential to be abused—and researchers have shown it can take just a single 'poisoned' document to do so. New findings from security researchers Michael Bargury and Tamir Ishay Sharbat, revealed at the Black Hat hacker conference in Las Vegas today, show how a weakness in OpenAI's Connectors allowed sensitive information to be extracted from a Google Drive account using an indirect prompt injection attack. In a demonstration of the attack, dubbed AgentFlayer, Bargury shows how it was possible to extract developer secrets, in the form of API keys, that were stored in a demonstration Drive account. The vulnerability highlights how connecting AI models to external systems and sharing more data across them increases the potential attack surface for malicious hackers and potentially multiplies the ways where vulnerabilities may be introduced. 'There is nothing the user needs to do to be compromised, and there is nothing the user needs to do for the data to go out,' Bargury, the CTO at security firm Zenity, tells WIRED. 'We've shown this is completely zero-click; we just need your email, we share the document with you, and that's it. So yes, this is very, very bad,' Bargury says. OpenAI did not immediately respond to WIRED's request for comment about the vulnerability in Connectors. The company introduced Connectors for ChatGPT as a beta feature earlier this year, and its website lists at least 17 different services that can be linked up with its accounts. It says the system allows you to 'bring your tools and data into ChatGPT' and 'search files, pull live data, and reference content right in the chat.' Bargury says he reported the findings to OpenAI earlier this year and that the company quickly introduced mitigations to prevent the technique he used to extract data via Connectors. The way the attack works means only a limited amount of data could be extracted at once—full documents could not be removed as part of the attack. 'While this issue isn't specific to Google, it illustrates why developing robust protections against prompt injection attacks is important,' says Andy Wen, senior director of security product management at Google Workspace, pointing to the company's recently enhanced AI security measures. Bargury's attack starts with a poisoned document, which is shared to a potential victim's Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) Inside the document, which for the demonstration is a fictitious set of notes from a nonexistent meeting with OpenAI CEO Sam Altman, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is written in white text in a size-one font, something that a human is unlikely to see but a machine will still read. In a proof of concept video of the attack, Bargury shows the victim asking ChatGPT to 'summarize my last meeting with Sam,' although he says any user query related to a meeting summary will do. Instead, the hidden prompt tells the LLM that there was a 'mistake' and the document doesn't actually need to be summarized. The prompt says the person is actually a 'developer racing against a deadline' and they need the AI to search Google Drive for API keys and attach them to the end of a URL that is provided in the prompt. That URL is actually a command in the Markdown language to connect to an external server and pull in the image that is stored there. But as per the prompt's instructions, the URL now also contains the API keys the AI has found in the Google Drive account. Using Markdown to extract data from ChatGPT is not new. Independent security researcher Johann Rehberger has shown how data could be extracted this way, and described how OpenAI previously introduced a feature called 'url_safe' to detect if URLs were malicious and stop image rendering if they are dangerous. To get around this, Sharbat, an AI researcher at Zenity, writes in a blog post detailing the work, that the researchers used URLs from Microsoft's Azure Blob cloud storage. 'Our image has been successfully rendered, and we also get a very nice request log in our Azure Log Analytics which contains the victim's API keys,' the researcher writes. The attack is the latest demonstration of how indirect prompt injections can impact generative AI systems. Indirect prompt injections involve attackers feeding an LLM poisoned data that can tell the system to complete malicious actions. This week, a group of researchers showed how indirect prompt injections could be used to hijack a smart home system, activating a smart home's lights and boiler remotely. While indirect prompt injections have been around almost as long as ChatGPT has, security researchers worry that as more and more systems are connected to LLMs, there is an increased risk of attackers inserting 'untrusted' data into them. Getting access to sensitive data could also allow malicious hackers a way into an organization's other systems. Bargury says that hooking up LLMs to external data sources means they will be more capable and increase their utility, but that comes with challenges. 'It's incredibly powerful, but as usual with AI, more power comes with more risk,' Bargury says.

DHL moves early to renew Cargojet contract until 2033
DHL moves early to renew Cargojet contract until 2033

Yahoo

time29 minutes ago

  • Yahoo

DHL moves early to renew Cargojet contract until 2033

Canadian airline Cargojet has extended its long-term transport agreement with integrated carrier DHL Express until March 31, 2033, and reduced DHL's potential ownership stake in the company from 9.5% to 6.6% in exchange for renewing the deal two years before it expired, the companies announced Wednesday. The revised freight services contract is projected to deliver $2.3 billion in revenue for Cargojet. DHL has the right to extend the agreement two times for two-year terms, potentially stretching the deal until March 2037. Cargojet was scheduled to release second-quarter results Wednesday after the stock market closed, but had not done so as of 7 p.m. ET. In early July, Cargojet extended its contract with Amazon for four years. The contract now runs until March 31, 2029. Cargojet began flying in DHL's express package network in 2005. It now provides bundled lease packages that include aircraft, crews and mechanics to fly freight; crew and maintenance in cases where DHL provides its own freighter aircraft; and charter service for short-term capacity needs. Cargojet has a fleet of more than 40 Boeing 767 and 757 freighters. Some of DHL's volume moves in Cargojet's domestic Canadian overnight network in which capacity is shared by various customers. Cargojet's current contract with DHL was signed in March 2022 and was scheduled to run five years. The companies cemented their partnership with the issuance of warrants giving DHL 9.5% of Cargojet shares after a seven-year vesting period. Under the expanded partnership, DHL will continue to guarantee a minimum amount of paid flight hours per month and give Cargojet preference to fly additional routes as it adjusts its global network to meet shipping demand. Cargojet will also terminate the warrants to acquire more than 1.6 million voting shares and instead issue warrants giving DHL the right to acquire 1 million shares at a price of $67.90 per share over a period of eight years, with vesting tied to DHL delivering up to $3.2 billion in business volume during the period. Click here for more FreightWaves/American Shipper stories by Eric Kulisch. Write to Eric Kulisch at ekulisch@ RELATED STORIES: New US de minimis policy could trim DHL profit by 3% Rise in China e-commerce traffic lifts Cargojet to record revenue The post DHL moves early to renew Cargojet contract until 2033 appeared first on FreightWaves. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

MetLife (NYSE:MET) Misses Q2 Revenue Estimates, Stock Drops
MetLife (NYSE:MET) Misses Q2 Revenue Estimates, Stock Drops

Yahoo

time29 minutes ago

  • Yahoo

MetLife (NYSE:MET) Misses Q2 Revenue Estimates, Stock Drops

Global insurance giant MetLife (NYSE:MET) fell short of the market's revenue expectations in Q2 CY2025, with sales falling 7.2% year on year to $17.34 billion. Its non-GAAP profit of $2.02 per share was 6.3% below analysts' consensus estimates. Is now the time to buy MetLife? Find out in our full research report. MetLife (MET) Q2 CY2025 Highlights: Net Premiums Earned: $12.75 billion vs analyst estimates of $11.15 billion (1.2% year-on-year decline, 14.4% beat) Revenue: $17.34 billion vs analyst estimates of $18.64 billion (7.2% year-on-year decline, 7% miss) Pre-Tax Profit Margin: 5.7% (flat year on year) Adjusted EPS: $2.02 vs analyst expectations of $2.16 (6.3% miss) Market Capitalization: $50.99 billion Company Overview Founded in 1863 by a group of New York businessmen during the Civil War era, MetLife (NYSE:MET) is a global financial services company that provides insurance, annuities, employee benefits, and asset management services to individuals and businesses worldwide. Revenue Growth Insurance companies generate revenue three ways. The first is the core insurance business itself, represented in the income statement as premiums earned. The second source is investment income from investing the 'float' (premiums collected but not yet paid out as claims) in assets such as fixed-income assets and equities. The third is fees from policy administration, annuities, and other value-added services. Unfortunately, MetLife's 2.7% annualized revenue growth over the last five years was sluggish. This was below our standards and is a rough starting point for our analysis. Long-term growth is the most important, but within financials, a half-decade historical view may miss recent interest rate changes and market returns. MetLife's recent performance shows its demand has slowed as its revenue was flat over the last two years. Note: Quarters not shown were determined to be outliers, impacted by outsized investment gains/losses that are not indicative of the recurring fundamentals of the business. This quarter, MetLife missed Wall Street's estimates and reported a rather uninspiring 7.2% year-on-year revenue decline, generating $17.34 billion of revenue. Net premiums earned made up 69.8% of the company's total revenue during the last five years, meaning insurance operations are MetLife's largest source of revenue. Net premiums earned commands greater market attention due to its reliability and consistency, whereas investment and fee income are often seen as more volatile revenue streams that fluctuate with market conditions. Here at StockStory, we certainly understand the potential of thematic investing. Diverse winners from Microsoft (MSFT) to Alphabet (GOOG), Coca-Cola (KO) to Monster Beverage (MNST) could all have been identified as promising growth stories with a megatrend driving the growth. So, in that spirit, we've identified a relatively under-the-radar profitable growth stock benefiting from the rise of AI, available to you FREE via this link. Book Value Per Share (BVPS) Insurance companies are balance sheet businesses, collecting premiums upfront and paying out claims over time. The float–premiums collected but not yet paid out–are invested, creating an asset base supported by a liability structure. Book value per share (BVPS) captures this dynamic by measuring these assets (investment portfolio, cash, reinsurance recoverables) less liabilities (claim reserves, debt, future policy benefits). BVPS is essentially the residual value for shareholders. We therefore consider BVPS very important to track for insurers and a metric that sheds light on business quality. While other (and more commonly known) per-share metrics like EPS can sometimes be lumpy due to reserve releases or one-time items and can be managed or skewed while still following accounting rules, BVPS reflects long-term capital growth and is harder to manipulate. MetLife's BVPS declined at a 15.6% annual clip over the last five years. On a two-year basis, BVPS fell at a slower pace, dropping by 5.4% annually from $39.96 to $35.79 per share. Over the next 12 months, Consensus estimates call for MetLife's BVPS to grow by 71% to $56.10, elite growth rate. Key Takeaways from MetLife's Q2 Results We were impressed by how significantly MetLife blew past analysts' net premiums earned expectations this quarter. On the other hand, its revenue missed and its book value per share fell short of Wall Street's estimates. Overall, this was a weaker quarter. The stock traded down 5.9% to $71.56 immediately following the results. MetLife's latest earnings report disappointed. One quarter doesn't define a company's quality, so let's explore whether the stock is a buy at the current price. We think that the latest quarter is just one piece of the longer-term business quality puzzle. Quality, when combined with valuation, can help determine if the stock is a buy. We cover that in our actionable full research report which you can read here, it's free. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store