Ransomware actor Conti, which has been targeting Costa Rican government entities since April 2022, has claimed on its leak site Conti News that it has "insiders" in the country's government, and they are working toward the compromise of "other systems."
U.S. authorities have charged a cardiologist based in Venezuela with developing and selling multiple strains of ransomware, including Jigsaw and Thanos, as well as recruiting affiliates to use the crypto-locking malware against victims in return for a cut of any ransoms paid.
EDR deployments will be underway at more than half of federal civilian agencies by the end of September, according to federal officials. CISA is currently in the process of deploying EDR across 26 federal civilian agencies and expects to have work underway at 53 agencies by Sept. 30, 2022.
If you were a nation with legions of hackers at your disposal, seeking to sidestep crippling international sanctions, would you look to ransomware to fund your regime? That question is posed by new research that finds state-sponsored North Korean hackers haven't stopped their ransomware experiments.
In the latest update, four editors at Information Security Media Group discuss the intriguing insights exposed by the leak of ransomware gang Conti's internal communications, the U.S. Treasury's first-ever sanctions on a cryptocurrency mixer and the latest cyber activity in Russia's hybrid war.
Hundreds of thousands of Konica Minolta printers used in businesses have reportedly been vulnerable to three critical flaws since 2019. Although a patch was available, deployment was delayed as the firmware update required physical access to the printers and COVID-19 made that difficult.
As the Russia-Ukraine war continues, cybersecurity officials say the risk of attack spillover - and perhaps the direct targeting of critical infrastructure sectors outside Ukraine - remains high. The memo for CISOs is clear: Remain prepared.
Pre-pandemic, escalating mobile banking adoption rate was primarily fueled by smartphone penetration, with over 4 billion people using smartphones. However, the disruption emerging from the onset of COVID-19 has been a major driver of mobile banking, fast-tracking the trend of mobile-first banking among younger...
Most consumers are now thrust into using online and mobile banking more often, FIs need to stay alert as digital acceleration elevates vulnerabilities for fraud, money laundering, and other illicit activity.
Download this report produced by Aite Group to learn how a digital-first strategy is imperative for...
Financial criminals are constantly adapting and evolving their tactics to get ahead of financial institutions (FIs). Keeping pace with these criminals is a challenge in of itself, and when you couple that with the need to comply to ever-changing regulations?
Download this eBook to learn how a cloud-based, AI-first...
Between the ever-changing fraud landscape, and the surge in digital banking (which is here to stay), small to mid-sized banks and credit unions are already at a crossroads for financial crime risk management.
To make matters even more challenging, conventional fraud and AML tools are generating an overwhelming...
According to Sophos, the average cost of rectifying a ransomware attack in the financial services industry was US$2.10 million, considering ransom paid, downtime, people time, device cost, network cost, lost opportunity, and other factors.
Download this article to learn more about how the ransomware risk for...
Viasat's satellite communications suffered an outage an hour before the Russian invasion of Ukraine began on Feb. 24. The company said it was a cyberattack, but did not identify the attacker. The U.S., U.K., EU and Ukraine have now attributed this attack to Russia.
As the Russia-Ukraine war continues, what cybersecurity lessons should be learned? At the CyberUK conference in Wales, cybersecurity czars focused on surprises - including low online attack volume and the role of hacktivists - and lauded Ukraine's cyber resilience, honed by years of stress testing.
Russia's use of wiper malware, DDoS attacks and targeted disinformation show it no longer depends on traditional methods in its war with Ukraine. John Walker, a professor and counterintelligence expert, says organizations need to be "more realistic" about how they handle cyberattacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.