Five suspected members of the InfinityBlack hacking group have been arrested, and authorities in Europe say they've seized two databases with more than 170 million entries, including combinations of stolen usernames and passwords.
$4 Billion dollars of fraudulent activity is coming through the phone channel. This webinar discusses the rise of fraud in the IVR and how the IVR has become a new vector of choice for fraudsters.
In an apparent attempt to spread TrickBot malware, cybercriminals are sending fake emails designed to look like notifications from the Labor Department concerning changes to the Family and Medical Leave Act, according to IBM X-Force.
A sophisticated, highly targeted phishing campaign has hit high-level executives at more than 150 businesses, stealing confidential documents and contact lists, says security firm Group-IB. The campaign, which targets Office 365 users, appears to trace to attackers operating from Nigeria and South Africa.
Researchers are seeing a spike in opportunism by fraudsters and cybercriminals seeking to profit from the COVID-19 crisis. Underground online markets are offering a range of pandemic-related goods, from face masks to fraudulent vaccines.
Each day brings a new wave of COVID-19 headlines, most of them unsettling. Business continuity plans have been pressure tested beyond their author's expectations, with the effects felt in operations, security, and customer experience. As a critical customer interface, contact centers have felt the effects directly,...
Access and analyze suspicious or malicious content without exposing your resources or your identity.
Reinforce your Open Source Intelligence (OSINT) skills with a combination of real-world research tips and techniques:
Leverage cross-functional open and dark web research techniques outlined by our military, law...
Cyber Threat Intelligence (CTI) isn't the exclusive domain of specialized organizations anymore. Yet many CTI practitioners - the analysts, researchers and threathunters who collect and manage Open Source Intelligence (OSINT) gleaned from the open, deep and Dark Web - report a lack of training, tools and internal...
To facilitate investigations across the vast expanses of the open, deep, and dark web, Authentic8 engineers built a guide to 21 easily accessible Open Source Intelligence (OSINT) research tools. The report provides a brief overview of each tool, where and how to get it, a supporting visual, and use case.
Advance...
Observations gained from the front lines of Incident Response and Proactive Services in 2019 and insights that matter for 2020
The year 2019 ushered in a host of new adversaries, new attack methods and new challenges for the cybersecurity industry. The CrowdStrike® Services team faced these trials head-on, across...
A quarter of financial institutions experienced at least one spear-phishing or business email compromise attack in 2019 where user credentials were compromised and/or fraud was committed. These attacks also often resulted in intellectual property and physical damage.
Yet, nearly half of institutions surveyed state...
Microsoft has pushed out a patch for a vulnerability in its Teams collaboration platform that could allow an attacker to take over an organization's accounts through the use of a weaponized GIF image.
Some fraudsters have pivoted from using the COVID-19 pandemic as a phishing lure to creating messages and malicious domains designed to capitalize on various U.S. economic stimulus programs.
The notorious carder marketplace Joker's Stash is advertising a fresh batch of 400,00 stolen payment cards issued by both South Korea and U.S. banks, warns Group-IB. It says that on average, stolen APAC payment card data sells for five times more than stolen U.S. payment card data.
The U.S. National Security Agency and the Australian Signals Directorate offer guidance on how to mitigate the growing threat posed by attackers using web shells to create backdoors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.