This week, the U.S. Treasury reported on crypto in crime, Changpeng Zhao's sentencing was rescheduled, PlayDapp was hacked, the UN probed North Korean hacking, suspicious crypto transactions increased in South Korea, the U.K. blocked fraud sites and Hong Kong warned about crypto phishing sites.
A Chinese-speaking cybercrime group with the codename GoldFactory has built a new Android and iOS banking Trojan, GoldPickaxe, that can harvest and steal personal details, including biometric face profiles, that attackers use to create AI-driven deepfakes to fool bank defenses, researchers warn.
Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.
Discover the transformative power of risk quantification with insights from Netflix's Tony Martin-Vegue, and learn why modernizing your approach could be the game-changer your risk analysis needs.
An Oklahoma-based healthcare system is notifying 2.4 million individuals that their sensitive information was potentially compromised in an exfiltration incident last year. Cybercriminals have been attempting to extort ransom payments directly from some of those affected patients - including kids.
A European court has sided with a Russian petitioner who challenged a Kremlin rule that requires telecom firms to backdoor their servers for law enforcement data collection. The court found that end-to-end encryption is essential to preserving the right to privacy in digital communication systems.
The French Ministry for Europe and Foreign Affairs accused Russia of running a disinformation campaign targeting Kyiv's Western allies ahead of the second anniversary of Moscow's invasion of Ukraine. The Russian approach to propaganda is a "firehose of falsehood," the Rand Corporation said.
The South Korean President's Office told local media Tuesday that suspected North Korean hackers had targeted the private email account of an official in November ahead of the president's state visits to the U.K. and France. Local reports suggest the hackers accessed the details of scheduled events.
Venture-capital owned Armis, a firm that touts its ability to prepare companies for attacks before they materialize, acquired cybersecurity startup CTCI in a transaction approaching $20 million. Armis will merge CTCI employees and technology over the next 30 days.
While overall ransomware profits might remain high, many of the remaining or rebooted top-tier groups are "really struggling" with scarce talent, trauma from the Russia-Ukraine war and repeated disruptions by law enforcement, say researchers from threat intelligence firm RedSense.
Likely due to operational security concerns, Hamas didn’t appear to deploy any unusual cyber operations or surge ahead of militants storming from the Gaza Strip into nearby Israeli towns last October, researchers report. But since then, some other regional actors haven't held back.
Two key European Parliament committees accepted a political compromise that aims to govern how trading bloc countries develop and deploy artificial intelligence. The regulation is set to become the globe's first comprehensive regulation concerning AI.
The U.S. federal patent authority aims to provide clarity on how it will analyze inventions. Only humans can be named in single-person patents, and at least one human must be labelled as the inventor of any given claim, the U.S. Patent and Trademark Office said Tuesday.
As U.S. federal regulators fine-tune a strategy to push the healthcare sector into strengthening its cybersecurity posture, they are dusting off a HIPAA compliance audit program that's been dormant for the last seven years. A new round of HIPAA audits for regulated entities is in the works.
Takedowns aren't always forever in cyberspace. Months after a U.S. law enforcement operation dismantled the notorious Qakbot botnet, security researchers said signs are pointing to a resurgence. Someone with access to the Qakbot - also known as Qbot - source code is experimenting with new builds.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.