Tag: finance
-
Canadian Financial Regulator Hacked, Exposing Personal Data from Member Organizations
The Canadian Investment Regulatory Organization (CIRO) said it will work to identify the personal information breached and notify those affected First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/canadian-financial-regulator-hacked/
-
NY Business Council discloses data breach affecting 47,000 people
The Business Council of New York State (BCNYS) has revealed that attackers who breached its network in February stole the personal, financial, and health information of over 47,000 individuals. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/business-council-of-new-york-state-discloses-data-breach-affecting-47-000-people/
-
NY Business Council discloses data breach affecting 47,000 people
The Business Council of New York State (BCNYS) has revealed that attackers who breached its network in February stole the personal, financial, and health information of over 47,000 individuals. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/business-council-of-new-york-state-discloses-data-breach-affecting-47-000-people/
-
Cryptoagility: the strategic pillar for digital resilience
Tags: compliance, crypto, cryptography, dora, finance, framework, google, infrastructure, PCI, regulation, resilience, risk, strategy, update, vulnerabilityA real case: the Chromecast incident: A real example I personally experienced made me appreciate this approach even more: on 9 March 2025, my second-generation Chromecast stopped working. It displayed the message “Untrusted device” when trying to cast, with no possibility of a solution. This problem was global, affecting users in several countries, and was…
-
The 9 Types of PCI SAQs and Applicability
Key Takeaways SAQ eligibility depends on exactly how you accept payments, how you handle cardholder data, and how your payment systems connect to the rest of your environment. The PCI Security Standards Council defines the SAQ types, but your acquiring bank or payment processor is the one who decides which applies to you. They may……
-
How to Stay Relaxed in a World of Increasing Cyber Threats
Is There a Simple Way to Stay Calm in the Face of Rising Cyber Threats? It’s no secret that cyber threats are increasing at an alarming pace. From financial services and healthcare to travel and development operations, we all grapple with the constant worry are our systems safe? While we can’t negate the rapid… First…
-
What is a Qualified Electronic Signature (QES)?
A Qualified Electronic Signature (QES) is the most secure and legally binding form of e-signature under EU eIDAS regulations. Unlike simple or advanced e-signatures, QES requires strict identity verification, qualified certificates, and trusted providers, making it equivalent to a handwritten signature. QES is widely used in finance, healthcare, government, and other regulated industries where compliance…
-
Workday Latest Company Hit by Third-Party CRM Platform Breach
Workday, a high-profile HR and finance software solutions maker, is the latest victim of a string of data breaches orchestrated by the resurgent ShinyHunters threat group through Salesforce’s CRM solution, joining a lineup of targets that includes Google, Qantas, Pandora, and Adidas. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/workday-latest-company-hit-by-third-party-crm-platform-breach/
-
UK’s Colt hit by cyberattack, support systems offline amid ransom threat
Tags: api, attack, china, communications, cve, cyberattack, data, data-breach, exploit, finance, flaw, group, infrastructure, Internet, microsoft, network, programming, ransom, rce, remote-code-execution, russia, service, software, threat, update, vulnerabilitywith samples on a Russian Tor site.”We’ve seen already this year that telecom is particularly vulnerable to attacks, and I think this WarLock attack highlights some recurring issues that telecom and large-scale network service providers are starting to see,” said Gabrielle Hempel, Security Operations Strategist at Exabeam. “There’s this operational ripple effect when you’re a…
-
Im Klartext: Millionen angeblicher Paypal-Zugangsdaten stehen zum Verkauf
Der Anbieter behauptet, im Besitz von 15,8 Millionen Paypal-Zugangsdaten zu sein. Sogar die Passwörter sollen im Klartext vorliegen. First seen on golem.de Jump to article: www.golem.de/news/im-klartext-millionen-angeblicher-paypal-zugangsdaten-stehen-zum-verkauf-2508-199275.html
-
Wazuh for Regulatory Compliance
Organizations handling various forms of sensitive data or personally identifiable information (PII) require adherence to regulatory compliance standards and frameworks. These compliance standards also apply to organizations operating in regulated sectors such as healthcare, finance, government contracting, or education. Some of these standards and frameworks include, but are not limited to: First seen on thehackernews.com…
-
Human resources firm Workday disclosed a data breach
Human resources firm Workday disclosed a data breach after attackers accessed a third-party CRM platform via social engineering. Workday is a cloud-based software company that specializes in enterprise applications for human capital management (HCM), financial management, and planning. The company provides services to over 11,000 organizations, including over 60% of Fortune 500 firms. The HR…
-
Threat Actor Claims to Sell 15.8 Million Plain-Text PayPal Credentials
A seller named Chucky_BF is offering 15.8M PayPal logins with emails, passwords, and URLs. The data may come… First seen on hackread.com Jump to article: hackread.com/threat-actor-selling-plain-text-paypal-credentials/
-
Cybersecurity Spending Slows & Security Teams Shrink
Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financial services, insurance, and tech. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cybersecurity-spending-slows-teams-shrink
-
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
Tags: attack, credentials, cybercrime, data, extortion, finance, group, service, tactics, technology, theftAn ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as ShinyHunters and Scattered Spider appear to be working hand in hand, new findings show.”This latest wave of ShinyHunters-attributed attacks reveals a dramatic shift in tactics, moving beyond the group’s previous credential theft and database…
-
Financial impact from severe OT events could top $300B
A report from industrial cybersecurity firm Dragos highlights growing risks of business interruption and supply-chain disruptions. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/financial-impact-severe-events-300-billion/757437/
-
Financial Services Could Be Next in Line for ShinyHunters
New threat intelligence points to targeting of financial services and technology sectors by ShinyHunters group First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/financial-services-next-line/
-
9 things CISOs need know about the dark web
Tags: 2fa, access, ai, attack, automation, backup, blockchain, botnet, breach, captcha, ceo, ciso, communications, corporate, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, ddos, deep-fake, defense, detection, dns, exploit, extortion, finance, fraud, group, guide, hacking, identity, incident, incident response, infrastructure, intelligence, international, jobs, law, leak, lockbit, malicious, malware, marketplace, mfa, monitoring, network, open-source, phishing, privacy, ransomware, resilience, risk, russia, saas, scam, service, strategy, tactics, technology, threat, tool, training, vpn, vulnerability, zero-dayNew groups form after major marketplaces are disrupted: International takedown efforts damage infrastructure and curb cybercrime operations by disrupting larger operations, removing major players from the ecosystem and scattering user bases.However, the dark web is highly adaptive and sophisticated actors often maintain contingency plans, including mirrors, backups, and alternative forums, according to Edward Currie, associate…
-
Stay Ahead of Cyber Threats in Secret Management
Is Your Strategy Robust Enough to Keep Pace With Emerging Cyber Threats in Secret Management? The stakes for organizations across industries like healthcare, financial services, and travel are higher than ever. Non-Human Identities (NHIs) and Secrets Management form a critical part of a holistic cybersecurity strategy, offering much-needed end-to-end protection. These methodologies provide a lifeline,……
-
Empower Teams with Effective IAM Strategies
Why is Secure NHI Management Critical for Successful Team Empowerment? How often does secure Non-Human Identity (NHI) management come to mind? Considering the increasing reliance on cloud-based solutions across industries, including healthcare, finance, and travel, it’s clear that cybersecurity should play a significant part in empowering teams. For DevOps and SOC teams, especially, the task……
-
SoupDealer Malware Evades Sandboxes, AVs, and EDR/XDR in Real-World Attacks
The SoupDealer malware has successfully bypassed nearly all public sandboxes and antivirus solutions, with the exception of Threat.Zone, while also evading endpoint detection and response (EDR) and extended detection and response (XDR) systems in documented real-world incidents. This advanced threat has inflicted significant damage across various sectors, including banks, internet service providers (ISPs), and mid-level…
-
Connex Credit Union data breach impacts 172,000 members
Connex, one of Connecticut’s largest credit unions, warned tens of thousands of members that unknown attackers had stolen their personal and financial information after breaching its systems in early June. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/connex-credit-union-discloses-data-breach-impacting-172-000-people/
-
Ghanaian fraudsters arrested for BEC/Sakawa
In Nigeria, scammers who specialize in Romance Scams and BEC are called “Yahoo Boys.” In Ghana, the term for the same activity is “Sakawa.” Several Ghanaian headlines are talking about this case with headlines such as “Multimillion dollar Sakawa” or “Sakawa Chairman Busted” or “Sakawa Kingpin Bows to Extradition!” On 08AUG2025 the US Attorney’s office…
-
CSO hiring on the rise: How to land a top security exec role
Tags: access, ai, attack, breach, business, cio, ciso, cloud, compliance, cyber, cybersecurity, data, defense, finance, governance, government, healthcare, identity, incident, incident response, infrastructure, insurance, jobs, military, network, regulation, resilience, risk, saas, service, skills, software, strategy, technology, threat, trainingWide-scale AI adoption shaking up skills sought: In terms of the skills wanted of today’s CSO, Fuller agrees that AI is the game-changer.”Organizations are seeking cybersecurity leaders who combine technical depth, AI fluency, and strong interpersonal skills,” Fuller says. “AI literacy is now a baseline expectation, as CISOs must understand how to defend against AI-driven…
-
Securing Machine Identities: Best Practices
Why is Machine Identity Security Essential? Do you find that businesses underestimate the significance of machine identity security? When innovation accelerates and we move our activities more to the cloud, securing machine identities, or non-human identities (NHIs), has become a growing focus among cybersecurity professionals. With widespread adoption of cloud services, financial services, healthcare, travel,……
-
Operation Chakra V: Call Center Scammers and your PII
Here we have another cautionary tale about off-shoring customer service when faced with the reality of Call Center Scams that commit fraud via Tech Support Scams and Government Impersonation. In this case, FirstIdea, an Indian company is charged with committing fraud against at least 100 victims from Australia and the UK. FirstIdea.us, according to their…
-
FTC: older adults lost record $700 million to scammers in 2024
Americans aged 60 and older lost a staggering $700 million to online scams in 2024, marking a sharp rise in fraud targeting seniors, according to the Federal Trade Commission. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ftc-older-adults-lost-record-700-million-to-scammers-in-2024/
-
DarkCloud Stealer Targets Windows Systems to Harvest Login Credentials and Financial Data
A new variant of the DarkCloud information-stealer malware has been observed targeting Microsoft Windows systems, primarily affecting Windows users by collecting sensitive data such as login credentials, financial information, and personal contacts. Discovered in early July 2025 by Fortinet’s FortiGuard Labs, this high-severity campaign leverages sophisticated phishing tactics to initiate infections, demonstrating advanced evasion methods…

