Group That Caused Power Outage Stops Focusing Exclusively on Ukraine

Electrum, the Russia-linked hacker group believed to be responsible for the 2016 power outage in Ukraine, no longer focuses exclusively on this country, according to industrial cybersecurity firm Dragos. Electrum...
Continue reading
0 Comments

AXA Partners With SecurityScorecard to Set Cyber Insurance Premiums

AXA Will Use Ratings From SecurityScorecard to Help Set Premiums for Insurance Agreements Cyber insurance is a problem. It is a new industry with huge potential but great difficulties. Getting...
Continue reading
0 Comments

The Future of GDPR - Dead, Diluted, Detested or Accepted?

“ GDPR Day ” (May 25th, 2018) has brought a flood of activity. For example, most of us have experienced an overload of updated privacy statements in our inboxes, which...
Continue reading
0 Comments

The Diminishing Returns of Our Constantly Growing Security Stacks

A couple of years ago, I had a conversation with a CISO that has stuck with me. His Board of Directors had dramatically increased the security budget without his prompting....
Continue reading
0 Comments

Facebook Deals With Chinese Firm Draw Ire From U.S. Lawmakers

Facebook drew fresh criticism from US lawmakers following revelations that it allowed Chinese smartphone makers , including one deemed a national security threat, access to user data. The world's largest...
Continue reading
0 Comments

Critical Vulnerability Addressed in Popular Code Libraries

A critical and widespread arbitrary file overwrite vulnerability has been addressed in popular libraries of projects from HP, Amazon, Apache, Pivotal, and more. Dubbed Zip Slip and discovered by the...
Continue reading
0 Comments

10 Hot Sessions: Infosecurity Europe in London

10 Hot Sessions: Infosecurity Europe in London
image
image
Artificial Intelligence & Machine Learning , Cyberwarfare / Nation-state attacks , Fraud Management & Cybercrime 10 Hot Sessions: Infosecurity Europe in London Cybersecurity Conference Tackles Cybercrime, AI, Breach Response, Privacy,...
Continue reading
0 Comments

Analysis: Data Breach Litigation Trends

Analysis: Data Breach Litigation Trends Attorney John Yanchunis Discusses the Latest Lawsuits) • June 5, 2018     15 Minutes    Just as the cyberthreat landscape is evolving, so too are...
Continue reading
0 Comments

Live Webinar: A Risk-Adaptive Approach to Data Protection in Canada

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use...
Continue reading
0 Comments

The Use of Machine Data in Finding Fraud

Cybersecurity , Data Breach , Fraud Splunk's Jim Apger on How to Draw the Fraud Story Out of Data June 4, 2018     Jim Apger, senior security architect, Splunk When...
Continue reading
0 Comments

Another Fitness App Exposes Users' Data

Another Fitness App Exposes Users' Data
Application Security , Mobility , Next-Generation Technologies & Secure Development Independent Researcher Finds PumpUp Data Was Accessible on Unsecured Amazon Server( HealthInfoSec ) • June 4, 2018     For...
Continue reading
0 Comments

Exclusive: Aussie Firm Loses $6.6M to Backdoored Cryptocurrency

Exclusive: Aussie Firm Loses $6.6M to Backdoored Cryptocurrency
image
image
image
image
image
Blockchain Applications , Electronic / Mobile Payments Fraud , Fraud Management & Cybercrime 'Soarcoin' Cryptocurrency Coded With Backdoor Hidden in Plain Site( jeremy_kirk ) • June 5, 2018    ...
Continue reading
0 Comments

RSA Fraud Report: Newsjacking-Based Phishing on the Rise

RSA Fraud Report: Newsjacking-Based Phishing on the Rise
Application Security , Fraud , Phishing Angel Grant Analyzes Findings, Which Also Show a Surge in Mobile App Fraud( @nickster2407 ) • June 5, 2018    Angel Grant, director of...
Continue reading
0 Comments

HR Software Firm PageUp Suffers Data Breach

PageUp, an Australian company that provides HR software, informed customers this week that it launched an investigation on May 23 after detecting suspicious activity on its IT infrastructure. The firm’s...
Continue reading
0 Comments

Mirai Variants Continue to Spawn in Vulnerable IoT Ecosystem

IoT Exploits
Mirai is the archetypal IoT botnet, first achieving infamy with a 665 Gbps DDoS attack against the KrebsOnSecurity website in September 2016. Within days, a second Mirai attack targeted the...
Continue reading
0 Comments

Facebook Says Chinese Phone Makers Got Access to Data

Facebook on Tuesday confirmed that a Chinese phone maker deemed a national security threat by the US was among companies given access to data on users. Huawei was able to...
Continue reading
0 Comments

Fortinet Acquires Bradford Networks to Extend Security to the Edge

Fortinet has acquired Boston-based network security firm Bradford Networks. The purpose is to extend Fortinet's micro segmentation to the new perimeter: that is, the IoT and mobile edge. A Fortinet...
Continue reading
0 Comments

Flaw in F-Secure Products Allowed Code Execution via Malicious Archives

A critical vulnerability affecting many consumer and corporate products from F-Secure could have been exploited for remote code execution using specially crafted archive files. A researcher who uses the online...
Continue reading
0 Comments

Oops! Botnet Operators Use Default Credentials on Command and Control Server

Internet of Things (IoT) botnets prey on the use of default or weak credentials to compromise connected devices, but the operators of such a botnet also used default credentials in...
Continue reading
0 Comments

IBM Adds New Features to MaaS360 with Watson UEM Product

IBM announced on Monday that it has added two new important features to its “MaaS360 with Watson” unified endpoint management (UEM) solution. UEM solutions allow enterprise IT teams to manage...
Continue reading
0 Comments