Tag: finance
-
North Korean Hackers Target Drug Companies in New Cyber Campaign
Pharmaceutical companies sit at the intersection of innovation, intellectual property, and global supply chains. This makes them highly attractive targets for nation-state actors seeking both strategic and financial advantage. New reporting from Cybersecurity News reveals that North Korean threat actors are actively targeting pharmaceutical organizations, aiming to compromise systems and access sensitive research and operational…
-
North Korean Hackers Target Drug Companies in New Cyber Campaign
Pharmaceutical companies sit at the intersection of innovation, intellectual property, and global supply chains. This makes them highly attractive targets for nation-state actors seeking both strategic and financial advantage. New reporting from Cybersecurity News reveals that North Korean threat actors are actively targeting pharmaceutical organizations, aiming to compromise systems and access sensitive research and operational…
-
North Korean Hackers Target Drug Companies in New Cyber Campaign
Pharmaceutical companies sit at the intersection of innovation, intellectual property, and global supply chains. This makes them highly attractive targets for nation-state actors seeking both strategic and financial advantage. New reporting from Cybersecurity News reveals that North Korean threat actors are actively targeting pharmaceutical organizations, aiming to compromise systems and access sensitive research and operational…
-
Lloyds Bank compensates another 1,625 customers after ‘alarming’ data breach
Bank pays out compensation to more customers and reveals expansion of affected group First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642496/Lloyds-Bank-compensates-another-1625-customers-after-alarming-data-breach
-
Lloyds Bank compensates another 1,625 customers after ‘alarming’ data breach
Bank pays out compensation to more customers and reveals expansion of affected group First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642496/Lloyds-Bank-compensates-another-1625-customers-after-alarming-data-breach
-
Lloyds Bank compensates another 1,625 customers after ‘alarming’ data breach
Bank pays out compensation to more customers and reveals expansion of affected group First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642496/Lloyds-Bank-compensates-another-1625-customers-after-alarming-data-breach
-
The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards
AI agents may soon be buying your stuff for you. The FIDO Alliance has teamed up with Google and Mastercard to try to ensure that shopping in the near future isn’t a complete disaster. First seen on wired.com Jump to article: www.wired.com/story/the-race-is-on-to-keep-ai-agents-from-running-wild-with-your-credit-cards/
-
Stopping AiTM attacks: The defenses that actually work after authentication succeeds
Tags: 2fa, access, attack, authentication, awareness, breach, communications, compliance, control, credentials, data, defense, detection, email, finance, framework, identity, incident response, login, mfa, microsoft, monitoring, nist, passkey, phishing, risk, service, threat, tool, trainingThe 3 controls that close the gap: Control #1: Bind sessions to managed devices The most impactful single control for session security is requiring managed, compliant devices as a condition of accessing sensitive resources. When access policies, such as Microsoft Entra Conditional Access, require that the device presenting a session token is enrolled, managed and…
-
DORA and the Practical Test of Operational Resilience
By Alan Stewart-Brown, VP EMEA, Opengear Disruption in financial services rarely follows a clean script. A misconfiguration, a spike in malicious traffic, or a poorly timed change can cascade across platforms and teams, particularly where systems and suppliers are tightly coupled. When that chain reaction starts, the challenge is rarely identifying the fault. It The…
-
DORA and the Practical Test of Operational Resilience
By Alan Stewart-Brown, VP EMEA, Opengear Disruption in financial services rarely follows a clean script. A misconfiguration, a spike in malicious traffic, or a poorly timed change can cascade across platforms and teams, particularly where systems and suppliers are tightly coupled. When that chain reaction starts, the challenge is rarely identifying the fault. It The…
-
OilRig Hides C2 Config in Google Drive Image via LSB Steganography
APT-C-49 (OilRig), an Iranian state-sponsored advanced persistent threat group also known as APT34 and Helix Kitten, has deployed a sophisticated new attack campaign that conceals command-and-control configurations inside Google Drive images using LSB steganography. The group, which has been active since at least 2014, primarily targets government, energy, telecommunications, and financial sectors across the Middle…
-
Fake KYC Android Malware Spreads via WhatsApp to Hijack Bank Accounts
A new Android malware campaign is masquerading as a “Banking KYC” verification app and spreading via WhatsApp messages to target banking users in India. The malware is delivered as an APK shared over WhatsApp, posing as an urgent bank KYC or account verification update similar to previously reported Indian banking fraud campaigns. Victims are told…
-
Trust, Risk, and the CISOs Protecting Michigan’s Financial Institutions
Financial services cybersecurity in Michigan does not all look the same. The CISOs in this feature are securing a wealth management firm, a specialty insurance group, a farm credit institution, a community bank, a credit union serving a major university’s community, and another credit union with a decade of continuous security leadership. The regulatory frameworks,…The…
-
Senators seek answers about hackers obtaining sensitive student data from ostensibly anonymous tip line
Sens. Maggie Hassan and Jim Banks wrote to Navigate360 after a hacker claimed to compromise the school safety tool. First seen on cyberscoop.com Jump to article: cyberscoop.com/maps360-student-data-breach-senate-investigation/
-
FTC: Americans lost over $2.1 billion to social media scams in 2025
The U.S. Federal Trade Commission (FTC) warned of a massive increase in losses from social media scams since 2020, exceeding $2.1 billion in 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ftc-americans-lost-over-21-billion-to-social-media-scams-in-2025/
-
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial, and government institutions to work together and protect them. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/building-teams-to-help-cyber-scam-victims
-
Helping Romance Scam Victims Require a Proactive, Empathic Approach
People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial and government institutions to work together and protect them. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/building-teams-to-help-cyber-scam-victims
-
Best of the Worst: Five Attacks That Looked Broken (and Worked)
<div cla I skipped last week’s roundup. Holiday weekend, family stuff, the usual. So this is a two-week-ish view of what we’ve published in the Threat Intelligence series since Edition 03 dropped on April 13. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/best-of-the-worst-five-attacks-that-looked-broken-and-worked/
-
Best of the Worst: Five Attacks That Looked Broken (and Worked)
<div cla I skipped last week’s roundup. Holiday weekend, family stuff, the usual. So this is a two-week-ish view of what we’ve published in the Threat Intelligence series since Edition 03 dropped on April 13. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/best-of-the-worst-five-attacks-that-looked-broken-and-worked/
-
New US House privacy bills raise hard questions about enterprise data collection
Tags: access, ai, awareness, banking, business, cio, ciso, compliance, credentials, data, finance, framework, governance, group, identity, insurance, Internet, jobs, law, privacy, regulation, risk, service, strategy, supply-chainWhere privacy law overlaps with AI governance: The SECURE Data Act does not contain broad, standalone AI governance rules, but it still touches AI in meaningful ways.The bill includes opt-outs for fully automated profiling used for decisions with legal or similarly significant effects. That language can clearly implicate some uses of AI, particularly in hiring,…
-
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/us-busts-myanmar-ring-targeting-us-citizens-financial-fraud
-
TDL 020 – Why DNS Is Your First Line of Cyber Defense – Chris Buijs
Tags: access, attack, automation, business, cisco, ciso, cloud, container, corporate, country, cyber, cybersecurity, data, ddos, defense, dns, encryption, endpoint, finance, firewall, group, hacker, ibm, infrastructure, Internet, iot, jobs, malicious, microsoft, network, office, phone, programming, router, saas, service, software, startup, strategy, switch, technology, threat, tool, training, update, usa, vulnerability, zero-trustIn Episode 20 of The Defender’s Log, host David Redekop sits down with Amsterdam-based tech veteran Chris Buijs to discuss the often-overlooked backbone of internet security: DNS (Domain Name System). The “Set-it-and-Forget-it” Trap Buijs, who transitioned from an electrician to a network architect, notes that many organizations treat DNS as a “utility” rather than a…
-
TDL 020 – Why DNS Is Your First Line of Cyber Defense – Chris Buijs
Tags: access, attack, automation, business, cisco, ciso, cloud, container, corporate, country, cyber, cybersecurity, data, ddos, defense, dns, encryption, endpoint, finance, firewall, group, hacker, ibm, infrastructure, Internet, iot, jobs, malicious, microsoft, network, office, phone, programming, router, saas, service, software, startup, strategy, switch, technology, threat, tool, training, update, usa, vulnerability, zero-trustIn Episode 20 of The Defender’s Log, host David Redekop sits down with Amsterdam-based tech veteran Chris Buijs to discuss the often-overlooked backbone of internet security: DNS (Domain Name System). The “Set-it-and-Forget-it” Trap Buijs, who transitioned from an electrician to a network architect, notes that many organizations treat DNS as a “utility” rather than a…
-
AI-Driven Attacks on Banking Databases: Governance at Scale
Mythos-class AI systems pose a new database security risk for financial institutions. Learn how Liquibase Secure protects against autonomous attacks and state corruption. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-driven-attacks-on-banking-databases-governance-at-scale/
-
AI-Driven Attacks on Banking Databases: Governance at Scale
Mythos-class AI systems pose a new database security risk for financial institutions. Learn how Liquibase Secure protects against autonomous attacks and state corruption. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-driven-attacks-on-banking-databases-governance-at-scale/
-
DORA and operational resilience: Credential management as a financial risk control
Tags: access, authentication, breach, control, credentials, dora, finance, regulation, resilience, riskArticle 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the regulation requires, and what a breach looks like when those controls are missing. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/
-
Cryptohack Roundup: US-Sanctioned Grinex Hacked
Also: Updates in KelpDAO, Drift, Hyperbridge Hacks. This week, Grinex was exploited, a hacker laundered KelpDAO funds, Circle was sued over $280M Drift hack, Rhea Finance and Volo Protocol were exploited, update in Hyperbridge hack, sentencing in art scam case, a French home invasion for crypto theft and eth.limo hijack thwarted. First seen on govinfosecurity.com…
-
The Guardian view on Anthropic’s Claude Mythos: when AI finds every flaw, who controls the internet? | Editorial
Tech can scale cyber-attacks and defences alike, raising questions about private power, public risk and the future of a shared internetAnthropic announced its latest AI model, <a href=”https://www.theguardian.com/technology/2026/apr/08/anthropic-ai-cybersecurity-software”>Claude Mythos, this month but said it would not be released publicly, because it turns computers into crime scenes. The company claimed that it could find previously unknown…

