With fraudsters evolving their tactics and tricking a growing number of people with authorized payment scams, it's time for banks and security solution providers to explore new ways to protect consumers who are left holding the bag, says Ian Mitchell, managing partner at Omega FinCrime.
North Korean state hacking group Kimsuky is developing Android malware targeted at South Korean users by disguising the apps as legitimate apps including a Google security plug-in and a document viewer. Seoul-based cybersecurity company S2W dubs the apps FastFire, FastSpy and FastViewer.
Customer engagement platform Twilio says the number of customers affected by a phishing campaign that coaxed employees of the San Francisco company into permitting attackers to bypass multifactor authentication protections will stand at a final tally of 209.
The Abnormal Security team just launched a new threat intel site named Abnormal Intelligence. Crane Hassold shares resources available, including an attack library, semi-annual threat intel reports, a glossary and exclusive insights from the Abnormal team.
In this ebook with Information Security Media Group,...
Migrating to cloud-based productivity platforms like Microsoft 365 and Google Workspace comes with easier collaboration, more agility, less maintenance, and reduced costs.
Yet, email attacks become a larger challenge as we work to keep data and employees safe in a cloud-based environment. How can you minimize these...
Fake gains in fake cryptocurrency investment accounts are meant to keep victims participating in a scam known as "pig butchering," which is a mounting threat in English-speaking countries. The scam begins with cultivation of an intimate online relationship.
Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.
But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we'll...
Many entities fight an uphill battle against increasingly clever phishing and related scams that lead to serious data compromises, say former CIA analyst Eric Cole and former Department of Justice Assistant Attorney General David Kris, who are both advisers at security firm Theon Technology.
Organizations can improve security with modern authentication protocols, but the big message to the marketplace is that FIDO Passkeys give customers more convenience and deliver a consistent user experience, according to panelists on the final day of FIDO Alliance's Authenticate 2022 Conference.
The ongoing global logistics disruptions stemming from the COVID-19 pandemic continue to impact businesses and consumers as the flow of consumer goods.
Supply chain issues were a key challenge for many retailers throughout 2021 and these challenges are expected to persist in 2022. Now there is another challenge...
Security researchers spotted a previously undetected PowerShell backdoor disguising itself as part of the Windows update process that appears to have infected at least 69 victims. When SafeBreach Labs ran obfuscated scripts downloaded by the backdoor through VirusTotal, they came back as clean.
Business Email Compromise (BEC) losses are up 51% year-over-year according to the FBI Crime Report. Additionally, Ransomware is surging, with more than double the number of incidents reported. It takes a defense-in-depth approach to reduce the risk of these popular threats. By understanding the current threats and...
Australian fruit and vegetable supplier Costa Group says it was subjected to a malicious and sophisticated phishing attack in August that resulted in unauthorized access to its servers. The company, listed on the Australian Securities Exchange, says that the attack occurred on Aug. 21.
Police arrested a teenager in his suburban Sydney home for allegedly attempting to extort AU$2,000 from victims of the Optus data breach. The unnamed 19-year-old allegedly threatened to conduct financial crimes using the information of 93 individuals unless he received a payout.
North Korea is using weaponized versions of open-source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.