Tag: finance
-
The Compliance Automation Revolution 2025
In 2025, compliance is no longer a box-ticking exercise, it’s a strategic business imperative. With new regulations like the EU’s NIS2 Directive, DORA for financial services, CMMC 2.0 for U.S. defense, and the Australian Privacy Act 2024, enterprises face tougher obligations, faster reporting timelines, and penalties reaching into the tens of millions. Yet most First…
-
GhostBat RAT Returns with Fake RTO Apps Targeting Indian Android Users with Telegram Bot-Driven Malware
A new trend of Android malware is sweeping across India, leveraging the guise of Regional Transport Office (RTO) apps to steal financial data, mine cryptocurrency, and exfiltrate SMS messages, all while secretly registering infected devices through Telegram bots. Known as GhostBat RAT, this new malware campaign has recently resurfaced. First seen on thecyberexpress.com Jump to article:…
-
Visa Puts Autonomous Commerce at the Core of Payments
The Payments Giant Is Creating Digital Rails for Secure, AI-Driven Commerce. Visa is doubling down on both B2C and B2B agentic AI use cases. Early experiments focus on automating repetitive, trust-sensitive financial tasks, but the company is rapidly expanding into more sophisticated scenarios, positioning itself at the center of the next major shift in global…
-
GhostBat RAT Returns with Fake RTO Apps Targeting Indian Android Users with Telegram Bot-Driven Malware
A new trend of Android malware is sweeping across India, leveraging the guise of Regional Transport Office (RTO) apps to steal financial data, mine cryptocurrency, and exfiltrate SMS messages, all while secretly registering infected devices through Telegram bots. Known as GhostBat RAT, this new malware campaign has recently resurfaced. First seen on thecyberexpress.com Jump to article:…
-
Beyond the checklist: Building adaptive GRC frameworks for agentic AI
Tags: access, ai, breach, ciso, cloud, compliance, control, crime, data, detection, endpoint, finance, framework, fraud, governance, grc, international, metric, monitoring, nist, risk, risk-management, strategy, supply-chain, switchAutonomous agent drift First, I experienced an autonomous agent drift that nearly caused a severe financial and reputational crisis. We deployed a sophisticated agent tasked with optimizing our cloud spending and resource allocation across three regions, giving it a high degree of autonomy. Its original mandate was clear, but after three weeks of self-learning and…
-
13 cybersecurity myths organizations need to stop believing
Tags: access, ai, attack, authentication, backup, banking, breach, business, ceo, compliance, computer, computing, corporate, credentials, cyber, cybersecurity, data, data-breach, deep-fake, defense, encryption, finance, government, group, identity, incident response, infrastructure, jobs, law, malicious, mfa, monitoring, network, nist, openai, passkey, password, phishing, privacy, regulation, risk, service, skills, strategy, technology, theft, threat, tool, vulnerabilityBig tech platforms have strong verification that prevents impersonation: Some of the largest tech platforms like to talk about their strong identity checks as a way to stop impersonation. But looking good on paper is one thing, and holding up to the promise in the real world is another.”The truth is that even advanced verification…
-
Unsupported OpenJDK in Financial Systems: Hidden Risks
Summary Financial institutions using Java can remain compliant with the EU’s DORA security framework with a secure, supported and stable Java platform. For this reason, all the world’s top 10 trading companies and six of the top 10 U.S. financial firms have switched to Azul. In this post you will learn: The EU’s Digital Operational Resilience Act (DORA) is a……
-
Police Bust GXC Team, One of the Most Active Cybercrime Networks
Spanish Guardia Civil and Group-IB arrest ‘GoogleXcoder,’ the 25-year-old Brazilian mastermind of the GXC Team, for selling AI-powered phishing kits and malware used to steal millions from banks across the US, UK, Spain, and Brazil. First seen on hackread.com Jump to article: hackread.com/police-bust-gxc-team-cybercrime-networks/
-
Police Bust GXC Team, One of the Most Active Cybercrime Networks
Spanish Guardia Civil and Group-IB arrest ‘GoogleXcoder,’ the 25-year-old Brazilian mastermind of the GXC Team, for selling AI-powered phishing kits and malware used to steal millions from banks across the US, UK, Spain, and Brazil. First seen on hackread.com Jump to article: hackread.com/police-bust-gxc-team-cybercrime-networks/
-
Vom CISO zum Chief Risk Architect
Tags: ai, business, ceo, ciso, cyber, cyberattack, cyersecurity, dora, finance, firewall, germany, incident response, nis-2, resilience, risk, risk-assessment, risk-management, supply-chain, technology, update, vulnerabilityDer moderne CISO wird zum Chief Risk Architect.Jahrelang waren CISOs im Maschinenraum der IT tätig und konzentrierten sich auf die Einhaltung von Vorschriften, die Verwaltung von Firewalls, Patching und die Reaktion auf Vorfälle. Ihr Hauptziel war es, einen Cyberangriff zu verhindern und die Sicherheit aufrechtzuerhalten. Doch dieses Modell wird der Komplexität moderner Bedrohungen nicht mehr…
-
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE andrew.gertz@t“¦ Mon, 10/13/2025 – 14:53 Discover how Thales empowers enterprises with sovereign access through FIDO authentication in SAS PCE”, ensuring secure, phishing-resistant identity control for hybrid environments. Identity & Access Management Access Control Guido Gerrits – Field Channel Director, EMEA More About This Author…
-
Financial, Other Industries Urged to Prepare for Quantum Computers
Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/financial-industries-urged-prepare-quantum-computers
-
AI red flags, ethics boards and the real threat of AGI today
Tags: ai, computer, control, data-breach, disinformation, finance, government, intelligence, risk, risk-management, threatQ: Should every large enterprise have an AI ethics board, and what should its remit include?: Paul Dongha: “When it comes to the executives and decision-makers of large corporations, I think there are a few things here.”Firstly, I believe an ethics board is absolutely mandatory. It should be comprised of senior executives drawn from a…
-
AI red flags, ethics boards and the real threat of AGI today
Tags: ai, computer, control, data-breach, disinformation, finance, government, intelligence, risk, risk-management, threatQ: Should every large enterprise have an AI ethics board, and what should its remit include?: Paul Dongha: “When it comes to the executives and decision-makers of large corporations, I think there are a few things here.”Firstly, I believe an ethics board is absolutely mandatory. It should be comprised of senior executives drawn from a…
-
Invoicely Database Leak Exposes 180,000 Sensitive Records
Cybersecurity researcher Jeremiah Fowler discovered nearly 180,000 files, including PII and banking details, left exposed on an unprotected database linked to the Invoicely platform. Read about the identity theft and financial fraud risks for over 250,000 businesses worldwide. First seen on hackread.com Jump to article: hackread.com/invoicely-database-leak-expose-sensitive-records/
-
Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
Tags: ai, banking, credentials, cyber, cybercrime, finance, government, group, law, network, phishing, theftSpanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and…
-
Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
Tags: ai, banking, credentials, cyber, cybercrime, finance, government, group, law, network, phishing, theftSpanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation marks a significant victory in the fight against banking credential theft in Spain. Cybercriminals Target Banks and Government Agencies Since 2023, Spain faced a surge in sophisticated phishing campaigns. Criminal groups impersonated major banks and…
-
CIO100 and CSO30 ASEAN 2025 Team Awards Finalists: Celebrating Technology and Cybersecurity Excellence Across the Southeast Asia region
About CIO100 and CSO30 ASEAN AwardsThe CIO100 and CSO30 ASEAN Awards are flagship programs by Foundry’s CIO and CSO brands, recognizing technology leadership excellence across the region. These prestigious awards celebrate individuals and teams who demonstrate innovation, measurable business value, and transformative impact in their organizations and industries.Estelle QuekEditorial Director, CIO and CSO ASEAN
-
CIO100 and CSO30 ASEAN 2025 Team Awards Finalists: Celebrating Technology and Cybersecurity Excellence Across the Southeast Asia region
About CIO100 and CSO30 ASEAN AwardsThe CIO100 and CSO30 ASEAN Awards are flagship programs by Foundry’s CIO and CSO brands, recognizing technology leadership excellence across the region. These prestigious awards celebrate individuals and teams who demonstrate innovation, measurable business value, and transformative impact in their organizations and industries.Estelle QuekEditorial Director, CIO and CSO ASEAN
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
Tags: apple, conference, cybercrime, data, email, finance, google, group, india, marketplace, microsoft, phishing, scam, serviceMy colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share “Crime-as-a-Service” offerings with one another. In our paper, “Classification of Cybercriminal Posts Using Large Language Models: A Comprehensive Study on Tech Support Scam Marketplaces,” Raghavendra will be…
-
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
Tags: apple, conference, cybercrime, data, email, finance, google, group, india, marketplace, microsoft, phishing, scam, serviceMy colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share “Crime-as-a-Service” offerings with one another. In our paper, “Classification of Cybercriminal Posts Using Large Language Models: A Comprehensive Study on Tech Support Scam Marketplaces,” Raghavendra will be…
-
Fake ‘Inflation Refund’ texts target New Yorkers in new scam
An ongoing smishing campaign is targeting New Yorkers with text messages posing as the Department of Taxation and Finance, claiming to offer “Inflation Refunds” in an attempt to steal victims’ personal and financial data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fake-inflation-refund-texts-target-new-yorkers-in-new-scam/
-
IT meets Finance So integrieren Unternehmen Rechnungserstellung in ihre Automatisierungsstrategie
Tags: financeIn vielen Unternehmen sind IT-gestützte Prozesse etabliert. Dennoch bleibt die Rechnungserstellung häufig ein manueller Vorgang. Word- und Excel-Vorlagen, PDFs ohne standardisierte Datenstruktur und isolierte Abläufe widersprechen einer durchgängigen Automatisierungsstrategie. Eine technisch integrierte Rechnungserstellung optimiert den gesamten Abrechnungsprozess von der Datenübernahme bis zur Übergabe an Drittsysteme. Bedeutung automatisierter Rechnungserstellung im Gesamtkonzept Rechnungen sind der zentrale Bestandteil…
-
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Tags: access, advisory, ai, attack, authentication, breach, business, ciso, cloud, computing, credentials, cve, cyber, cybersecurity, data, defense, endpoint, exploit, extortion, finance, framework, fraud, google, governance, guide, hacker, hacking, identity, incident response, Internet, iot, jobs, login, microsoft, monitoring, network, nist, oracle, organized, password, privacy, ransomware, risk, risk-assessment, risk-management, scam, skills, technology, threat, tool, training, update, vulnerability, vulnerability-management, zero-dayWant recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud. Key takeaways Eager to…
-
Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands
Adversaries have once again demonstrated that operational hours are irrelevant when mounting sophisticated cyberattacks. eSentire’s TRU team first observed suspicious activity within a financial services customer’s environment when legitimate CiscoVPN logins coincided with anomalous WMI calls to multiple endpoints. Investigation revealed that an Active Directory account named “serviceaccount” had been abused alongside the VPN access,…
-
Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands
Adversaries have once again demonstrated that operational hours are irrelevant when mounting sophisticated cyberattacks. eSentire’s TRU team first observed suspicious activity within a financial services customer’s environment when legitimate CiscoVPN logins coincided with anomalous WMI calls to multiple endpoints. Investigation revealed that an Active Directory account named “serviceaccount” had been abused alongside the VPN access,…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…

