Tag: finance
-
CaaStle CEO Commits a Major Fraud Faux Pas
by
in SecurityNewsCEO Accused of Providing Misleading Revenue, Liquidity Numbers to Key Stakeholders. Financial statement fraud is once again making headlines. Fashion startup CaaStle has accused its co-founder and CEO, Christine Hunsicker, of serious financial misconduct, leading to her resignation. The incident could be one of the biggest cases of start-up fraud in recent years. First seen…
-
Norway and Nordic financial sector ramps up cyber security
by
in SecurityNewsFinans Norge sets up cyber security unit CTSU to support the finance sector in Norway amid increasing threats First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366621703/Norway-and-Nordic-financial-sector-ramps-up-cyber-security
-
Senators re-up bill to expand Secret Service’s financial cybercrime authorities
by
in SecurityNewsThe bipartisan legislation would strengthen the agency’s authorities to investigate criminal activity tied to digital assets. First seen on cyberscoop.com Jump to article: cyberscoop.com/secret-service-financial-cybercrimes-senate-bill/
-
ISMG Editors: Who Will Shore Up Trump’s Federal Cyber Cuts?
by
in SecurityNewsAlso: 23andMe’s Privacy Meltdown, Investors’ $500M AI Bet on ReliaQuest. In this week’s update, ISMG editors discussed the Trump administration’s cybersecurity funding cuts and potential impact on state and local ransomware defense. 23andMe’s bankruptcy and the FTC’s stance on genetic data privacy, ReliaQuest’s $500 million raise and what it means for AI-led SecOps. First seen…
-
Banks to share fraud data with tech firms in cross-sector collaboration
by
in SecurityNewsUK banks join tech firms in fraud data-sharing initiative to enable collaboration on action to stop online scams First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366622133/Banks-to-share-fraud-data-with-tech-firms-in-cross-sector-collaboration
-
New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data
by
in SecurityNewsA newly discovered credit card skimming campaign, dubbed >>RolandSkimmer,
-
23andMe Bankruptcy: Should DNA Data Go to the Top Bidder?
by
in SecurityNewsLawyer Jonathan Armstrong on Legal, Ethical Fallout From Looming 23andMe Auction. The financial collapse of personal genomics giant 23andMe raises an urgent question: What happens to your most intimate data when the company holding it goes bankrupt? Jonathan Armstrong, partner at Punter Southall Law, warns of cascading legal, ethical and security consequences. First seen on…
-
What’s Ailing Faster Payments Adoption in the US?
by
in SecurityNewsIncentives, Technology Barriers and Fraud Fears Hamper FedNow Growth. Economic hesitation, legacy concerns and escalating fraud fears have hampered the adoption of a payment rail touted as the next big thing in the U.S. payment landscape, with government backing and technological promise of clear benefits to consumers and the financial sector. First seen on govinfosecurity.com…
-
Texas city warns thousands of utility payment site breach
by
in SecurityNewsAt least 12,000 people in Texas had sensitive financial information stolen by hackers who secretly implanted malicious code into the utility payment website of the City of Lubbock. First seen on therecord.media Jump to article: therecord.media/texas-city-warns-thousands-of-utility-site-breach
-
What’s Ailing Faster Payments Adoption in the U.S.?
by
in SecurityNewsIncentives, Tech Barriers and Fraud Fears Hamper FedNow Growth. Economic hesitation, legacy concerns and escalating fraud fears have hampered the adoption of a payment rail touted as the next big thing in the U.S. payment landscape, with government backing and technological promise of clear benefits to consumers and the financial sector. First seen on govinfosecurity.com…
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
by
in SecurityNews
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
New Phishing Campaign Targets Investors to Steal Login Credentials
by
in SecurityNewsSymantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マãƒãƒƒã‚¯ã‚¹è¨¼åˆ¸), a prominent online securities company in Japan formed through the merger of Monex, Inc. and Nikko Beans, Inc. The company provides individual investors with a range of financial services, making it an attractive target for cybercriminals. The phishing operation involves the…
-
Oracle quietly admits data breach, days after lawsuit accused it of cover-up
by
in SecurityNews
Tags: access, attack, authentication, breach, cloud, compliance, credentials, crime, cve, cybersecurity, data, data-breach, endpoint, exploit, finance, fraud, hacker, identity, infrastructure, intelligence, law, oracle, resilience, risk, service, strategy, supply-chain, technology, theft, threat, vulnerabilityLawsuit challenges Oracle’s response: The reports of Oracle’s acknowledgement of the breach come just days after the company was hit with a class action lawsuit over its handling of the security breach.The lawsuit specifically addresses a major security breach discovered in March that reportedly compromised 6 million records containing sensitive authentication-related data from Oracle Cloud…
-
Emerging Risks Require IT/OT Collaboration to Secure Physical Systems
by
in SecurityNewsWith an increase in cyber-physical attacks that can cause significant disruptions, financial fallout and safety concerns for victim organizations, Renee Guttmann and Marc Sachs discuss why IT and OT security teams cannot keep working in silos. First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/experts-discuss-current-and-emerging-ics-security-risks
-
Sensitive Data Breached in Highline Schools Ransomware Incident
by
in SecurityNewsHighline Public Schools revealed that sensitive personal, financial and medical data was accessed by ransomware attackers during the September 2024 incident First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/sensitive-data-highline-ransomware/
-
National Impact Must Drive Cybersecurity Decisions
by
in SecurityNewsRoxanne Pashaei on Matching Organizational Risks With National Cybersecurity Risks. In the face of intensifying geopolitical tensions and nation-state threats, cybersecurity efforts must move beyond organizational boundaries and financial risk models to consider broader national impact, said Roxanne Pashaei who is the former CISO of a public sector enterprise. First seen on govinfosecurity.com Jump to…
-
Modern SecOPs TCO Analysis: The Economic Case for Unified Security Platforms
by
in SecurityNewsIn today’s rapidly evolving threat landscape, organizations face mounting challenges with traditional, fragmented security approaches. This analysis examines the total cost of ownership (TCO) of conventional security infrastructures compared to modern unified platforms, revealing significant operational and financial advantages of consolidated solutions. The Seceon Open Threat Management (OTM) Platform represents a paradigm shift in security…
-
SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers
by
in SecurityNewsA recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing a stealthy malware loader, Emmenhtal, in conjunction with the SmokeLoader malware. This campaign demonstrates advanced tactics by financially motivated threat actors to distribute infostealers like CryptBot and Lumma Stealer. The attack chain begins with weaponized 7z archives and culminates in…
-
Threat-informed defense for operational technology: Moving from information to action
by
in SecurityNews
Tags: access, ai, attack, automation, blueteam, cloud, control, crime, cyber, cyberattack, cybercrime, cybersecurity, data, defense, detection, exploit, finance, fortinet, framework, group, incident response, infrastructure, intelligence, law, malicious, malware, mitre, network, phishing, PurpleTeam, ransomware, RedTeam, resilience, risk, service, soar, strategy, tactics, technology, threat, tool, usaThe rise of cybercrime-as-a-service Today’s macro threat landscape is a flourishing ecosystem of cybercrime facilitated by crime-as-a-service (CaaS) models. Cybercriminal networks now operate like legitimate businesses, with specialized units dedicated to activities such as money laundering, malware development, and spear phishing. This ecosystem lowers the barrier to entry for cybercrime, enabling low-skilled adversaries to launch…
-
Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion
by
in SecurityNewsCyberhaven bags $100 million in funding at a billion-dollar valuation, a sign that investors remain bullish on data security startups. The post Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/cyberhaven-banks-100-million-in-series-d-valuation-hits-1-billion/
-
FTC chief flags data privacy concerns in 23andMe bankruptcy
by
in SecurityNewsThe company filed for bankruptcy after financial challenges over the past few years and;a massive data breach in 2023. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ftc-chief-flags-data-privacy-risks-23andme-bankruptcy/744184/
-
New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices
by
in SecurityNewsAs the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of IRS-themed scams. Research from McAfee Labs has revealed a sharp increase in fraudulent activities targeting mobile devices, with scammers using deceptive text messages and fake IRS websites to steal personal and financial information. Mobile Attacks…
-
APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors
APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within the finance and telecommunications sectors. The group, active since 2012, is a well-documented advanced persistent threat (APT) actor linked to the Middle East. Recent investigations by the ThreatBook Research and Response Team have revealed that…
-
Safeguarding Student and Faculty Data: Cybersecurity in Higher Education
by
in SecurityNewsHigher education institutions store vast amounts of sensitive information, including student and personnel records, financial details, and proprietary faculty research. This accumulated data makes schools an ideal target for bad actors in the modern cyberscape, yet such dangers are further heightened by colleges’ and universities’ unique technology requirements. Therefore, implementing reliable security compliance solutions is”¦…
-
FTC: Data privacy policy adherence necessary for 23andMe buyer
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/ftc-data-privacy-policy-adherence-necessary-for-23andme-buyer