E-commerce and fraud - they evolved and grew together in 2020, and it's time for fraud defenses to do the same. Smriti Jaggi of F5 details how to deploy a multi-layered fraud defense without adding extra friction to the process.
The Biden administration has appointed Anne Neuberger, the deputy national security adviser for cyber and emerging technology, to coordinate the investigation into the cyberattack that targeted SolarWinds and other organizations, following criticism from two senators that the probe has lacked coordination.
After years of attacking networks and custom software, enterprising hackers found an easier attack vector and switched to attacking the application development process itself.
Hackers simply add their malicious code to common open source projects used by organizations and wait for the developers to add the code to...
In order to detect actionable threats, organizations must collect, continuously monitor, query and analyze a massive volume of security telemetry and other relevant data for indicators of compromise (IOCs), indicators of attacks (IOAs) and other threats.
Doing this at scale, 24/7, across a hybrid cloud environment,...
Citing a lack of coordination and transparency, U.S. Sens. Mark Warner and Marco Rubio of the Intelligence Committee are urging the four federal agencies investigating the cyberattack that targeted SolarWinds and other organizations to designate a leader for their investigative efforts.
The developers of LodaRAT malware, which has previously only targeted Windows devices, have developed a new variant, Loda4Android, that targets Android devices, according to Cisco Talos.
Pre-IPO investments in Israeli cybersecurity firms totaled $2.9 billion in 2020, up 70% from the previous year, and exports of products and services increased as well, according to the Israel National Cyber Directorate. Security experts offer insights on the reasons behind the growth.
The network perimeter is dissolving. An ever-increasing attack surface covers virtually every device in the world. Yet businesses must still be able to complete a digital transformation in order to respond quickly to new customer demands and market trends.
In this paper, you'll learn how effective protection at the...
Today, bots are a hot topic; one that affects all web applications.
As a result, many vendors are trying to latch onto this trend by claiming to have the ability to identify and mitigate bots. It’s only natural that you’ll want to evaluate the claims of these vendors.
Use these 13 Questions to help...
The threat of bot scams to online retail is a growing problem in the industry. These days, bot traffic on e-commerce sites is causing an increasing amount of damage, and with the increasing sophistication of these bad bots, there is a need for an equally sophisticated solution.
In this industry-specific study of...
Your data is the most valuable resource on the planet.
Download this whitepaper to learn how digital transformation is creating new challenges for data security, where you should apply more effective security controls, and what an “Edge-to-End” security posture brings to the modern enterprise.
Hackers used a fake Forcepoint extension, leveraging the Google Chrome Sync feature, to exfiltrate data and send commands to infected browsers, according to a report by a Croation security researcher writing for the SANS Institute.
Tenable’s Security Response Team is taking a look back at the vulnerabilities and threats that made 2020 one of the most active years for security teams in recent memory. In our report, you'll learn the key insights you need to move forward in 2021 with confidence, such as:
The year's Top 5 vulnerabilities,...
Get answers to all your questions about how to seize cloud opportunities and realize your business’ potential—while also protecting all your data beyond what’s possible on-premises—in this wide-ranging conversation among experts and thought leaders from Microsoft and Barracuda. And a sneak peek of the Cloud to...
Researchers at the security firm Netlab have identified a previously undocumented botnet dubbed "Matryosh" that is targeting vulnerable Android devices to help build its network so it can conduct distributed denial-of-service attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.