Tag: finance
-
CIO100 and CSO30 ASEAN 2025 Team Awards Finalists: Celebrating Technology and Cybersecurity Excellence Across the Southeast Asia region
About CIO100 and CSO30 ASEAN AwardsThe CIO100 and CSO30 ASEAN Awards are flagship programs by Foundry’s CIO and CSO brands, recognizing technology leadership excellence across the region. These prestigious awards celebrate individuals and teams who demonstrate innovation, measurable business value, and transformative impact in their organizations and industries.Estelle QuekEditorial Director, CIO and CSO ASEAN
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
Tags: apple, conference, cybercrime, data, email, finance, google, group, india, marketplace, microsoft, phishing, scam, serviceMy colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share “Crime-as-a-Service” offerings with one another. In our paper, “Classification of Cybercriminal Posts Using Large Language Models: A Comprehensive Study on Tech Support Scam Marketplaces,” Raghavendra will be…
-
Our APWG eCrimes Paper on Tech Support Scam Facebook Groups
Tags: apple, conference, cybercrime, data, email, finance, google, group, india, marketplace, microsoft, phishing, scam, serviceMy colleague Raghavendra Cherupalli will be at APWG eCrime next month sharing a paper based on our research into the Facebook Groups where illicit Indian Call Centers share “Crime-as-a-Service” offerings with one another. In our paper, “Classification of Cybercriminal Posts Using Large Language Models: A Comprehensive Study on Tech Support Scam Marketplaces,” Raghavendra will be…
-
Fake ‘Inflation Refund’ texts target New Yorkers in new scam
An ongoing smishing campaign is targeting New Yorkers with text messages posing as the Department of Taxation and Finance, claiming to offer “Inflation Refunds” in an attempt to steal victims’ personal and financial data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fake-inflation-refund-texts-target-new-yorkers-in-new-scam/
-
IT meets Finance So integrieren Unternehmen Rechnungserstellung in ihre Automatisierungsstrategie
Tags: financeIn vielen Unternehmen sind IT-gestützte Prozesse etabliert. Dennoch bleibt die Rechnungserstellung häufig ein manueller Vorgang. Word- und Excel-Vorlagen, PDFs ohne standardisierte Datenstruktur und isolierte Abläufe widersprechen einer durchgängigen Automatisierungsstrategie. Eine technisch integrierte Rechnungserstellung optimiert den gesamten Abrechnungsprozess von der Datenübernahme bis zur Übergabe an Drittsysteme. Bedeutung automatisierter Rechnungserstellung im Gesamtkonzept Rechnungen sind der zentrale Bestandteil…
-
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Tags: access, advisory, ai, attack, authentication, breach, business, ciso, cloud, computing, credentials, cve, cyber, cybersecurity, data, defense, endpoint, exploit, extortion, finance, framework, fraud, google, governance, guide, hacker, hacking, identity, incident response, Internet, iot, jobs, login, microsoft, monitoring, network, nist, oracle, organized, password, privacy, ransomware, risk, risk-assessment, risk-management, scam, skills, technology, threat, tool, training, update, vulnerability, vulnerability-management, zero-dayWant recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud. Key takeaways Eager to…
-
Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands
Adversaries have once again demonstrated that operational hours are irrelevant when mounting sophisticated cyberattacks. eSentire’s TRU team first observed suspicious activity within a financial services customer’s environment when legitimate CiscoVPN logins coincided with anomalous WMI calls to multiple endpoints. Investigation revealed that an Active Directory account named “serviceaccount” had been abused alongside the VPN access,…
-
Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands
Adversaries have once again demonstrated that operational hours are irrelevant when mounting sophisticated cyberattacks. eSentire’s TRU team first observed suspicious activity within a financial services customer’s environment when legitimate CiscoVPN logins coincided with anomalous WMI calls to multiple endpoints. Investigation revealed that an Active Directory account named “serviceaccount” had been abused alongside the VPN access,…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
Hackers Exploit Microsoft Employee Accounts in Salary Theft Scheme
Tags: attack, authentication, credentials, cyber, exploit, finance, hacker, intelligence, microsoft, phishing, theft, threatMicrosoft Threat Intelligence is sounding the alarm on a surge of sophisticated “payroll pirate” attacks, in which financially motivated adversaries hijack employee accounts to reroute salary payments to attacker-controlled bank accounts. In the first half of 2025, Storm-2657 launched a widespread phishing campaign against university staff, harvesting credentials and multifactor authentication (MFA) codes. Attackers deployed…
-
Bank of England smells hint of dotcom bubble 2.0 in AI froth
UK central bank warns of ‘sudden correction’ in tech stocks First seen on theregister.com Jump to article: www.theregister.com/2025/10/08/boe_dotcom_bubble_ai/
-
Risk mitigation budgets swell as enterprise AI adoption grows
Governing AI comes at a cost, with most organizations increasing oversight investments in the next financial year, according to OneTrust data. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/AI-risk-mitigation-governance-oversight-data/802320/
-
Your cyber risk problem isn’t tech, it’s architecture
Tags: ai, attack, awareness, best-practice, business, ciso, cloud, compliance, container, control, csf, cyber, cybersecurity, data, data-breach, defense, finance, framework, GDPR, governance, grc, group, intelligence, Internet, ISO-27001, mitre, nist, PCI, phishing, privacy, ransomware, regulation, risk, risk-assessment, risk-management, software, strategy, threat, training, update, vulnerabilityIf the company already has a mature risk culture: The implementation of a cybersecurity management project becomes more flexible. Since my goal is to share the mechanics to achieve success in a cybersecurity program, I emphasize below some components of this ‘recipe’ to consider: Understand the dynamics and scope of the business, mapping stakeholders, processes…
-
Your cyber risk problem isn’t tech, it’s architecture
Tags: ai, attack, awareness, best-practice, business, ciso, cloud, compliance, container, control, csf, cyber, cybersecurity, data, data-breach, defense, finance, framework, GDPR, governance, grc, group, intelligence, Internet, ISO-27001, mitre, nist, PCI, phishing, privacy, ransomware, regulation, risk, risk-assessment, risk-management, software, strategy, threat, training, update, vulnerabilityIf the company already has a mature risk culture: The implementation of a cybersecurity management project becomes more flexible. Since my goal is to share the mechanics to achieve success in a cybersecurity program, I emphasize below some components of this ‘recipe’ to consider: Understand the dynamics and scope of the business, mapping stakeholders, processes…
-
The ultimate business resiliency test: Inside Kantsu’s ransomware response
set up a new group email system and secure emergency contact pointsestablish a dedicated contact point for business partners to handle inquiriesprohibit internal internet accesscheck the operational status of major systemsAll shipping operations came to a halt. The company explained the situation to all employees at 9:00 a.m., and began assessing the damage and taking…
-
The ultimate business resiliency test: Inside Kantsu’s ransomware response
set up a new group email system and secure emergency contact pointsestablish a dedicated contact point for business partners to handle inquiriesprohibit internal internet accesscheck the operational status of major systemsAll shipping operations came to a halt. The company explained the situation to all employees at 9:00 a.m., and began assessing the damage and taking…
-
The ultimate business resiliency test: Inside Kantsu’s ransomware response
set up a new group email system and secure emergency contact pointsestablish a dedicated contact point for business partners to handle inquiriesprohibit internal internet accesscheck the operational status of major systemsAll shipping operations came to a halt. The company explained the situation to all employees at 9:00 a.m., and began assessing the damage and taking…
-
The Evolution of Chaos: Ransomware’s New Era of Speed and Intelligence
In 2025, the notorious Chaos ransomware has undergone a dramatic transformation, emerging with a sophisticated C++ variant that represents the most dangerous iteration to date. This marks the first time Chaos has departed from its traditional .NET foundation, introducing destructive extortion tactics and cryptocurrency theft capabilities that significantly amplify both operational impact and financial risk…
-
Salesforce AI agents set to assist enterprises with security and compliance
Tags: access, ai, cisco, cloud, compliance, crowdstrike, data, detection, finance, google, ibm, marketplace, strategy, threat, tool, vulnerabilitySalesforce Agentforce: Agentforce is a relatively new platform but has already evolved at an extremely rapid pace. It was first unveiled in September 2024, became generally available the following month, added testing and agent lifecycle management tools in November, announced integration with Slack and other platforms in December, added autonomous agents that can take action…
-
Salesforce AI agents set to assist enterprises with security and compliance
Tags: access, ai, cisco, cloud, compliance, crowdstrike, data, detection, finance, google, ibm, marketplace, strategy, threat, tool, vulnerabilitySalesforce Agentforce: Agentforce is a relatively new platform but has already evolved at an extremely rapid pace. It was first unveiled in September 2024, became generally available the following month, added testing and agent lifecycle management tools in November, announced integration with Slack and other platforms in December, added autonomous agents that can take action…
-
Salesforce AI agents set to assist enterprises with security and compliance
Tags: access, ai, cisco, cloud, compliance, crowdstrike, data, detection, finance, google, ibm, marketplace, strategy, threat, tool, vulnerabilitySalesforce Agentforce: Agentforce is a relatively new platform but has already evolved at an extremely rapid pace. It was first unveiled in September 2024, became generally available the following month, added testing and agent lifecycle management tools in November, announced integration with Slack and other platforms in December, added autonomous agents that can take action…
-
Stablecoins: The New Currency of Online Criminals
Dollar-Pegged Tokens Trade Volatility for Convenience But Are Easier to Track. Fraudsters are routing more proceeds through stablecoins tied to U.S. dollars for liquidity. Forensics teams are gaining more visibility from issuer controls, but banks and regulators face a fast, interoperable ecosystem that needs better monitoring and coordinated enforcement. First seen on govinfosecurity.com Jump to…
-
Nearly a year after attack, US medical scanning biz gets clear image of stolen patient data
No fraud monitoring and no apology after miscreants make off with medical, financial data First seen on theregister.com Jump to article: www.theregister.com/2025/10/07/10_months_later_us_medical/
-
Qilin Claims Ransomware Attack on Mecklenburg Schools
The Qilin ransomware gang has claimed attacks at Mecklenburg County Public Schools, stealing financial records and childrens’ medical files First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/qilin-ransomware-mecklenburg/
-
Jaguar Land Rover to restart production following cyberattack
After halting global production last month, Jaguar Land Rover says it will restart operations and provide financial support to some of its suppliers. First seen on therecord.media Jump to article: therecord.media/jaguar-land-rover-restarting-production-after-cyberattack
-
Jaguar Land Rover to restart production following cyberattack
After halting global production last month, Jaguar Land Rover says it will restart operations and provide financial support to some of its suppliers. First seen on therecord.media Jump to article: therecord.media/jaguar-land-rover-restarting-production-after-cyberattack

