Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
This week, Chinese spying, Italian hacking scandal, an FBI warning and Okta fixed a bug. Google mandated MFA, zero days in PTZOptics and a Mexican airport didn't pay ransom. Cybercriminals demanded baguettes, breach lettersin Ohio and Germany will shield white hats. The Italian DPA rebuked a bank.
A hacking incident at Thompson Coburn, a national law firm based in Missouri, has affected an unspecified number of patients of a healthcare sector client, Presbyterian Healthcare Services in New Mexico. But a big unanswered question is whether other clients were affected.
KYC protocols traditionally focus on account-level verification, but examining KYC at the product level can help banks assess risk more accurately. Asking targeted questions based on product risk enables institutions to detect potential financial crimes, said Gabriella Bussien, CEO of Trapets.
This week, Metawin hacks, LottieFiles attack, hackers used Ethereum smart contracts to target npm developers, Craig Wright faced contempt of court, Alameda sued KuCoin, Binance sought dismissal of a U.S. Securities and Exchange lawsuit, and Immutable received a Wells Notice.
Microsoft's latest Digital Defense Report exposed an increasingly complex cyber battlefield in which nation-state actors team up with cybercriminals to launch sophisticated attacks, while organizations continue to struggle to defend against these evolving threats.
One post-election question pertaining to Donald Trump's upcoming presidency is how his administration will choose to combat cybercrime, and to what extent the White House will continue to take a leadership role in combating ransomware and cybercrime - especially based in Russia.
The question isn’t whether to move away from SEGs—it’s how to do it in a way that enhances security, reduces costs, and prepares your organization for future challenges. These legacy systems, once the backbone of email security, are proving to be expensive, resource-intensive, and ineffective at dealing with...
Traditional SEGs have become increasingly ineffective against sophisticated threats like business email compromise (BEC) and account takeovers. Once designed to block spam and malware, SEGs now struggle with evolving tactics that bypass their signature-based defenses. This has led to rising costs, complexity, and...
Traditional secure email gateways (SEGs) can’t keep up with today’s advanced, targeted attacks. This guide reveals how modern threats, including business email compromise (BEC), credential phishing, and invoice fraud, bypass traditional SEGs, leaving organizations vulnerable to costly breaches and data loss. Learn...
Republican Donald Trump's return to the White House in January could bring significant changes to technology and cybersecurity policy in the United States, potentially reshaping federal approaches to AI regulation, industry investment and national security against rising digital threats.
The impact of a major U.S. national security breach attributed to China reportedly continues to expand, as investigators probe the infiltration of telecommunications infrastructure and eavesdropping on national security and policymaking officials' mobile phone communications.
Four years since Trump's last term, the cyber picture looks - in many ways - markedly different. How will the incoming administration tackle Russian disinformation and cyber operations against NATO, rampant Chinese cyber espionage, and cybercriminals and ransomware continuing to disrupt businesses?
In cybersecurity, there's no such thing as "done learning." The field's dynamic nature - driven by rapid technological advances and evolving threats - demands that professionals stay adaptable and proactive. It's essential for staying relevant, effective and prepared for what's next.
Ingersoll Rand, a global leader in connected Operational Technology (OT) equipment, faced significant cybersecurity challenges. Stuxnet-style attacks were a major concern, as Noah Davis, VP & Global CISO, explains: “If you can get past the controls, you can create explosions.” Upon joining in 2023, Davis...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.