The paper’s analysis confirms that beyond ensuring basic Active Directory hygiene, IT and security executives should look for key capabilities when selecting technology to prevent and detect AD vulnerabilities, threats, and attacks. These capabilities include high visibility for AD vulnerabilities and exposures, detection of live attacks, and discovery of misconfigurations.
While financial services firms are increasingly embracing artificial intelligence (AI) and machine learning (ML) technologies, they’ve also captured cyber criminals’ attention. Never content to simply maintain the status quo, this group is busy putting the technologies to work to make their techniques stronger and more likely to succeed. AI and ML tools allow them to …
The cybersecurity of financial institutions is appearing as a top priority for the Bank of England in the coming months. The central bank will focus on stress testing IT defences for online attacks and establishing new standards for how quickly and effectively financial institutions should contain these breaches. The objective is to improve banks’ operational …
Attivo Networks will present alongside the FBI at this year’s FS-ISAC Annual Summit, held May 20-23 in Boca Raton, Fla. This year’s event theme is Strength in Sharing and will focus on how to solve the challenges of the evolving threat landscape and support corporate strategies by leveraging advanced technologies and services that expand the cybersecurity perimeter.
Trickbot is now redirecting to a counterfeit site that displays the correct URL and the digital certificate of its genuine equivalent.
A notorious banking Trojan is targeting customers of a major bank with a new email spam campaign, which directs victims to a fake login page that’s indistinguishable from that of their real bank.
The credential-stealing Trickbot banking malware has been hitting the financial sector since last year and targets online banking customers in in the US, UK, Australia, and other countries.
More than two dozen U.S. companies, including several big banks, have teamed up to establish shared principles that would allow them to better understand their cyber security ratings and to challenge them if necessary, the U.S. Chamber of Commerce said on Tuesday. Large corporations often use the ratings, the cyber equivalent of a FICO credit score, to assess how prepared the companies they work with are to withstand cyber attacks. Insurers also look at the ratings when they make underwriting decisions on cyber liability.
The group includes big banks like JPMorgan Chase & Co (JPM.N), Goldman Sachs Group Inc (GS.N) and Morgan Stanley (MS.N), as well as non-financial companies like coffee retailer Starbucks Corp (SBUX.O), health insurer Aetna Inc (AET.N) and home improvement chain Home Depot Inc (HD.N). They are organizing the effort through the Chamber of Commerce, a broad trade group for corporate America.
Swift, the global banking platform used to manage money transfers between over 10,000 financial institutions, is urging its users to bulk up security amid revelations the US National Security Agency (NSA) exploited vulnerabilities in Microsoft products to spy on its clients.
Last week, a hacking group known as the Shadow Brokers published a batch of explosive documents alleging the NSA accessed the Swift network by compromising third party services in the Middle East and Latin America. The group previously released files exposing alleged NSA “cyberweapons”.
“Customers should pay close attention their own security and take security into consideration when selecting a service bureau and working with other third party providers,” the Brussels-based organisation said in a lengthy statement on 17 April (Monday).
India is dealing with one of the worst data breaches ever to hit the country with as many as 3.2 million debit card details stolen from multiple banks and financial platforms.
On Thursday, the Economic Times reported that malware was used to compromise the Hitachi Payment Services platform, used to power India’s ATM, point-of-sale (PoS) systems and other financial transactions.
This infection then affected the State Bank of India (SBI), ICICI, Yes, Axis and HDFC, which are said to be the hardest hit. The Visa and Mastercard networks are also allegedly affected by the data breach — which took roughly six weeks to detect.
People who work in the City of London, the UK capital’s financial centre, are being targeted by a specific kind of computer attack that holds digital files to ransom.
Cybersecurity company Malwarebytes says that the City of London is a hotbed for ransomware attacks compared to the rest of Europe.
The company monitored cybersecurity threats for just over a year to see which parts of Europe had the most attacks. It found that the City of London suffered 10,500 ransomware attacks, which is 670% more than the second-biggest target, Manchester.