Tag: finance
-
One-Time Passcodes Are Gateway for Financial Fraud Attacks
Report Reveals Growing Trend of Fraudsters Intercepting SMS-Based Verification. Financial institutions have historically relied on one-time passcodes as a primary authentication control for their accountholders. But OTP verification is less reliable as fraudsters increasingly exploit SMS-based verification weaknesses to carry out account takeover and payment fraud schemes. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/one-time-passcodes-are-gateway-for-financial-fraud-attacks-a-31341
-
What makes Non-Human Identities safe for companies
Have You Ever Considered How Securing Non-Human Identities Could Transform Your Organization? Non-Human Identities (NHIs) security is increasingly crucial across various sectors, from financial services to healthcare and beyond. These machine identities are not mere technical entities but fundamental components that define a company’s cybersecurity. By understanding and managing NHIs effectively, organizations can bridge the……
-
AutoSecT Mobile: Automating Android and iOS Security Testing
Your banking app knows your face. It reads your fingerprint. It trusts that the person holding the phone is really you. But what if it’s wrong? Mobile-first banking has made financial services more accessible than ever. You can transfer money, pay bills, and apply for loans all from your phone, all in seconds. But this……
-
Board-Ready Security Metrics That Actually Matter
<div cla TL;DR Board-ready security metrics translate technical capabilities into financial risk and business outcomes. Boards need visibility across three dimensions: risk exposure, incident response capability, and governance compliance. Runtime application security contributes meaningful data points to these broader metrics, helping security leaders present more complete organizational risk assessments. First seen on securityboulevard.com Jump to…
-
Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture
The next major breach hitting your clients probably won’t come from inside their walls. It’ll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor nobody in IT knows about. That’s the new attack surface, and most organizations are underprepared for it.Cynomi’s new guide, Securing the Modern…
-
Trusted Platforms Exploited to Steal Philippine Banking Credentials
Hackers are increasingly exploiting trusted online platforms to launch sophisticated phishing campaigns targeting bank users in the Philippines. Despite ongoing improvements in email security, phishing remains one of the most effective attack methods due to its scalability and ease of deployment. The campaign, active since early 2024 and still evolving in 2026, primarily targets customers…
-
Microsoft releases open-source toolkit to govern autonomous AI agents
AI agents can book travel, execute financial transactions, write and run code, and manage infrastructure without human intervention at each step. Frameworks like LangChain, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/03/microsoft-ai-agent-governance-toolkit/
-
Cryptohack Roundup: Charges in Uranium Finance Case
Also: Chinese Firms Indicted in Crypto-Linked Fentanyl Supply Case. This week, charges filed in Uranium Finance hack, indictment of Chinese firms in fentanyl supply case, a class action lawsuit against Nvidia, Drift Protocol exploit, KuCoin operational barriers in the United States and a U.K. sanction filed against Xinbi. First seen on govinfosecurity.com Jump to article:…
-
State AG Sues Change Healthcare in 2024 Ransomware Attack
Iowa Seeking Civil Monetary Fines, Damages for Alleged Violations. Iowa’s state attorney general is seeking financial damages, civil penalties and improvements to UnitedHealth Group’s data security practices for alleged violations of state and federal laws and other claims involving the 2024 ransomware attack on its Change Healthcare unit. First seen on govinfosecurity.com Jump to article:…
-
Reengineering AML in the Era of Instant Payments
Financial Institutions Are Rethinking Controls to Ensure Frictionless Transactions. When the Federal Reserve lifted FedNow’s transaction limit from $1 million to $10 million last November, the regulatory change transformed instant payments from a retail convenience to a corporate treasury rail. AML decisions on high-value instant wire transfers must now be made in real time. First…
-
MIWIC26: Nkiruka Joy Aimienoho, Chief Information Security Officer, Standard Chartered Bank NG
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2026’s Top 20 women selected by an esteemed panel of judges. Presented in a Q&A format, the nominee’s answers are…
-
EvilTokens abuses Microsoft device code flow for account takeovers
A phishing package with post-compromise focus: Beyond the initial access vector, EvilTokens is structured as a full-service phishing platform. The kit provides affiliates with ready-to-use lures, infrastructure, and automation tools designed to carry out both the phishing phase and post-compromise activity.The lures used in the campaign include fake SharePoint document notifications, DocuSign requests, and account…
-
Bank Trojan ‘Casbaneiro’ Worms Through Latin America
Augmented Marauder’s multipronged banking-Trojan cyber campaigns are targeting Spanish speakers, evading detection, and replicating rapidly. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/bank-trojan-casbaneiro-worms-latin-america
-
Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign
Hackers have launched a targeted phishing campaign by cloning Ukraine’s official CERT-UA website and distributing malicious software disguised as a security tool, according to a new alert from the national cyber response team. Targets included government agencies, financial institutions, educational bodies, medical centers, and IT companies. The emails urged recipients to download a password-protected archive…
-
Bank Negara Malaysia RMiT Update: New Authentication Rules for Fintech and Banks
Bank Negara Malaysia’s updated RMiT framework introduces stricter authentication rules for banks and fintech apps. Learn how passkeys, adaptive MFA, device binding, and risk-based authentication help meet compliance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/bank-negara-malaysia-rmit-update-new-authentication-rules-for-fintech-and-banks/
-
Google links Axios npm supply chain attack to North Korea-linked APT UNC1069
Google links the Axios npm supply chain attack to North Korean threat group UNC1069, targeting financial gain. Google has attributed the recent Axios npm supply chain compromise to a North Korean threat group tracked as UNC1069. The attack, aimed at financial gain, exploited the package to target developers and organizations relying on Axios. John Hultquist…
-
Eight in 10 UK Manufacturers Hit by Cyber Incident in a Year
Most UK manufacturers compromised last year suffered financial loss, says ESET First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/eight-10-uk-manufacturers-hit/
-
Financial groups lay out a plan to fight AI identity attacks
Generative AI tools have brought the cost of deepfake production low enough that criminals and state-sponsored actors now use them routinely against financial institutions. A … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/01/fight-ai-identity-fraud/
-
Maryland Man Charged Over $53m Uranium Finance Crypto Hack
Maryland man accused of $53m Uranium Finance hack, exploited smart contract flaws, laundered funds First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/man-charged-uranium-crypto-hack/
-
US indicts Maryland man for 2021 theft of $54 million from Uranium Finance
U.S. Attorney Jay Clayton said Spalletta “repeatedly hacked smart contracts to steal millions of dollars’ worth of other people’s money for himself, and destroyed a cryptocurrency exchange in the process.” First seen on therecord.media Jump to article: therecord.media/us-indicts-maryland-man-54-million-crypto-theft
-
Nearly half a Million mobile customers of Lloyds Banking Group affected by security incident
Lloyds Banking Group data incident exposed transactions of ~450,000 mobile banking users due to a faulty update. A faulty software update at Lloyds Banking Group exposed transaction details of nearly 450,000 mobile banking users on March 12. The issue caused some customers to see other users’ account activity within the app, prompting the bank to…
-
Hacker stripped more than $50 million from Uranium crypto exchange, spent it on trading cards
US prosecutors have charged a Maryland man in connection with two hacks of the Uranium Finance cryptocurrency exchange that led to losses exceeding $50 million. Jonathan … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/31/uranium-finance-crypto-hack-man-charged/
-
Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation
The Dutch Ministry of Finance took treasury banking portal offline after a cyberattack; core tax systems were not affected. The Dutch Ministry of Finance took parts of its infrastructure offline, including the treasury banking portal, after detecting a cyberattack two weeks earlier. The Dutch Ministry of Finance disclosed a cyberattack detected on March 19 after…
-
Nach zwei Hacks in einem Monat: Kryptodieb kauft von Millionenbeute Pokémon-Karten
Ein Mann soll von der Krypto-Börse Uranium Finance über 50 Millionen US-Dollar gestohlen und dann Unsummen für Sammlerobjekte ausgegeben haben. First seen on golem.de Jump to article: www.golem.de/news/nach-zwei-hacks-in-einem-monat-kryptodieb-kauft-von-millionenbeute-pokemon-karten-2603-207104.html
-
8 ways to bolster your security posture on the cheap
Tags: access, attack, authentication, awareness, breach, ciso, control, credentials, cyber, cyberattack, cybersecurity, data, data-breach, ddos, dkim, dmarc, dns, email, endpoint, exploit, finance, google, identity, Internet, metric, mfa, microsoft, mitigation, okta, passkey, password, phishing, risk, risk-management, service, strategy, technology, tool, training, update, waf, zero-day2. Take full advantage of your existing tools: A practical way to strengthen enterprise security without incurring additional significant spend is to ensure you’re fully leveraging the capabilities of solutions already present within your organization, says Gary Brickhouse, CISO at security services firm GuidePoint Security.”Most organizations have invested heavily in security solutions, yet most are…
-
Hacker charged with stealing $53 million from Uranium crypto exchange
U.S. prosecutors have charged a Maryland man with stealing more than $53 million after hacking the Uranium Finance crypto exchange twice and laundering the proceeds through a cryptocurrency mixer. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/
-
Dutch Finance Ministry takes treasury banking portal offline after breach
The Dutch Ministry of Finance took some of its systems offline, including the digital portal for treasury banking, while investigating a cyberattack detected two weeks ago. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach/

