Tag: finance
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
Top Dutch telco Odido admits 6.2M customers caught in contact system caper
Names, addresses, bank account numbers accessed but biz insists passwords and call data untouched First seen on theregister.com Jump to article: www.theregister.com/2026/02/13/odido_breach/
-
AI Governance. When AI becomes an Identity.
Building the Control Plane for ERP, Finance, and SaaS AI didn’t come with a rollout plan; it crept in unnoticed. Someone turned on a copilot in a finance or CRM application, an IT team tested an agent on a non”‘production system that still contained real audit data, or a regional team started using an AI……
-
Bretton Raises $75M to Use AI for Financial Crime Compliance
AI Agents Target Anti-Money Laundering at Major Global Banks, Cut Manual Probes. Bretton AI has raised $75 million in Series B funding led by Sapphire Ventures to scale AI agents for anti-money laundering sanctions and KYC compliance. CEO Will Lawrence says the company is targeting large banks with automation designed to reduce manual investigations and…
-
Odido confirms massive breach; 6.2 Million customers impacted
Hackers accessed data from 6.2 million Odido accounts, exposing names, contacts, bank details, and ID numbers. Subsidiary Ben also warned customers. Hackers broke into Dutch telecom firm Odido and accessed data from 6.2 million accounts. The company confirmed the breach and said attackers took names, addresses, phone numbers, email addresses, bank account details, dates of…
-
‘Dead’ Outlook add-in hijacked to phish 4,000 Microsoft Office Store users
Tags: banking, breach, browser, chrome, control, credentials, credit-card, data, finance, google, infrastructure, malicious, marketplace, microsoft, office, password, phishingoutlook-one.vercel.app, hosted on the Vercel development platform, from which users download the software.”Microsoft reviews the manifest, signs it, and lists the add-in in their store. But the actual content the UI, the logic, everything the user interacts with is fetched live from the developer’s server every time the add-in opens,” said Koi Security’s researchers. By…
-
Dutch mobile phone giant Odido announces data breach
In a statement about the incident, Odido CEO Søren Abildgaard said names, bank account numbers, addresses, mobile numbers, email addresses, account numbers and IDs were stolen. First seen on therecord.media Jump to article: therecord.media/dutch-telecom-giant-announces-data-breach
-
FTC push for age verification a ‘major landmark’ for spread of the tool
The FTC’s COPPA rule should not be an “impediment to the most child protective technology to emerge in decades,” a senior agency official said recently. First seen on therecord.media Jump to article: therecord.media/ftc-push-for-age-verification-a-major-landmark-for-implementation
-
Gartner® Names Tenable as the Current Company to Beat for AI-Powered Exposure Assessment in a 2025 Report
Tags: access, ai, api, attack, automation, business, cloud, container, cyber, cybersecurity, data, exploit, finance, flaw, gartner, governance, identity, intelligence, iot, leak, network, risk, service, technology, threat, tool, update, vulnerability“Tenable’s asset and attack surface coverage, its application of AI and its reputation for vulnerability assessment makes it the front-runner in AI-powered exposure assessment,” Gartner writes in “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment.” Key Takeaways from Tenable: This is the latest among a recent string of recognitions Tenable…
-
Healthcare Networks, Financial Regulators, and Industrial Systems on the Same Target List
More than 25 million individuals are now tied to the Conduent Business Services breach as investigations continue to expand its scope. In Canada, approximately 750,000 investors were affected in the CIRO data breach. During roughly the same period, 2,451 vulnerabilities specific to industrial control systems were disclosed by 152 vendors. The latest ColorTokens Threat Advisory……
-
How are smart algorithms transforming Secrets Rotation practices
How Can Smart Algorithms Revolutionize Secrets Rotation Practices? How are professionals adapting to safeguard machine identities effectively? The advent of smart algorithms is transforming how organizations manage Secrets Rotation, a fundamental aspect of cybersecurity that encompasses the management of Non-Human Identities (NHIs) and their associated secrets. This transformation is reshaping industries, from finance and healthcare……
-
North Korea’s UNC1069 Hammers Crypto Firms With AI
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/north-koreas-unc1069-hammers-crypto-firms
-
North Korea’s UNC1069 Hammers Crypto Firms With AI
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/north-koreas-unc1069-hammers-crypto-firms
-
North Korea’s UNC1069 Hammers Crypto Firms With AI
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/north-koreas-unc1069-hammers-crypto-firms
-
Google sent personal and financial information of student journalist to ICE
The tech giant handed over the personal information of a journalist and student who attended a pro-Palestinian protest in 2024. This is the latest example of ICE using its controversial subpoena powers to target people critical of the Trump administration. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/10/google-sent-personal-and-financial-information-of-student-journalist-to-ice/
-
FIIG Securities Fined AU$2.5 Million Following Prolonged Cybersecurity Failures
Australian fixed-income firm FIIG Securities has been fined AU$2.5 million after the Federal Court found it failed to adequately protect client data from cybersecurity threats over a period exceeding four years. The penalty follows a major FIIG cyberattack in 2023 that resulted in the theft and exposure of highly sensitive personal and financial information belonging to thousands of clients. First seen on thecyberexpress.com…
-
Artificial intelligence now finance sector’s ‘connective tissue’
Major study finds debate over AI adoption is over as almost every finance firm in the world is already using the technology First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366638913/Artificial-intelligence-now-finance-sectors-connective-tissue
-
Bloody Wolf Cybercrime Group Uses NetSupport RAT to Breach Organizations
The latest campaign, they have switched to misusing a legitimate remote administration tool called NetSupport RAT. A cybercriminal group known as >>Stan Ghouls<< (or Bloody Wolf) has launched a fresh wave of attacks targeting organizations across Central Asia and Russia. Active since at least 2023, this group focuses heavily on the manufacturing, finance, and IT…
-
Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX
Cloud security titan Zscaler Inc. has acquired SquareX, a pioneer in browser-based threat protection, in an apparent move to step away from traditional, clunky security hardware and toward a seamless, browser-native defense. The acquisition, which did not include financial terms, integrates SquareX’s browser detection and response technology into Zscaler’s Zero Trust Exchange platform. Unlike traditional..…
-
Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX
Cloud security titan Zscaler Inc. has acquired SquareX, a pioneer in browser-based threat protection, in an apparent move to step away from traditional, clunky security hardware and toward a seamless, browser-native defense. The acquisition, which did not include financial terms, integrates SquareX’s browser detection and response technology into Zscaler’s Zero Trust Exchange platform. Unlike traditional..…
-
Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX
Cloud security titan Zscaler Inc. has acquired SquareX, a pioneer in browser-based threat protection, in an apparent move to step away from traditional, clunky security hardware and toward a seamless, browser-native defense. The acquisition, which did not include financial terms, integrates SquareX’s browser detection and response technology into Zscaler’s Zero Trust Exchange platform. Unlike traditional..…
-
How Banks Can Limit Losses From First-Party Fraud
Cadence Bank’s Brent Phillips Focuses on Controls for Online Account Opening. Financial institutions face rising losses from first-party fraud schemes that begin with online account opening. One of the most effective ways to reduce exposure involves practical, risk-based controls that limit how much trust new customers receive before their behavior can be established. First seen…
-
FTC data highlights online threats to consumers and businesses
The commission listed several steps companies can take to fend off attacks. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ftc-ransomware-scams-fraud-report/811705/
-
Hackers Abuse Apple PayPal Invoice Emails in DKIM Replay Attack Campaign
A sophisticated way to bypass email security by weaponizing legitimate messages from trusted companies like Apple and PayPal. These attacks, known as DKIM replay attacks, exploit email authentication systems to deliver scams that appear completely authentic. The technique is deceptively simple. Attackers create accounts on platforms like Apple’s App Store or PayPal and manipulate user-controlled…
-
Never settle: How CISOs can go beyond compliance standards to better protect their organizations
Tags: ai, awareness, breach, ciso, compliance, computing, control, cybersecurity, finance, risk, risk-assessment, risk-management, software, strategy, threat, training, vulnerabilityThe new North Star for CISOs: Accounting for emerging risk: We’ve established that it’s no longer good enough to overfit into a compliance standard, but you can still use compliance to your advantage.Most compliance programs mandate an information security risk assessment and, at a larger company, you may already have a dedicated enterprise risk management…
-
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT.Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing attacks…
-
OpenClaw Taps VirusTotal to Safeguard AI Agent Skill Ecosystem
As AI agents move from experimental chatbots to powerful tools capable of managing our finances and smart homes, security has become the top priority. Today, OpenClaw announced a major partnership with VirusTotal to bring advanced threat detection to ClawHub, its marketplace for AI skills. Why AI Agents Need Special Protection Traditional software is rigid; it…

