Tag: finance
-
Janela RAT Spreads via Fake MSI Installers, Malicious Extensions
Janela Remote Access Trojan (RAT) campaign using fake Windows MSI installers and malicious browser extensions to infiltrate financial networks and exfiltrate sensitive data. The latest Janela RAT samples are being distributed through public GitLab repositories, where attackers host MSI installation files disguised as legitimate software installers. Unsuspecting users in Chile, Colombia, and Mexico the campaign’s primary targets are lured into downloading these…
-
Hackers Exploit Obsidian Plugin to Deploy Cross-Platform Malware
Hackers are abusing Obsidian’s Shell Commands plugin and shared cloud vaults to deliver a new cross”‘platform malware chain that ends with the PHANTOMPULSE remote access trojan. Attackers pose as a venture capital firm targeting financial and cryptocurrency professionals, first engaging over LinkedIn and then moving conversations to Telegram group chats with multiple fake “partners” to…
-
Best of the Worst: Five Attacks That Already Knew Your Name
<div cla TL;DR This week’s Attack of the Day posts revealed a clear shift from volume to precision. A phishing PDF auto-launched a credential harvest page the instant it opened, no click required. A QR code inside another PDF had the target’s email address pre-encoded in base64, so the landing page pre-filled the victim’s username…
-
JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025
Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT.A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect…
-
Banks Must Act Like Interpol to Fight Fraud Networks
Joël Winteregg of Vyntra on How AI Is Industrializing Fraud at Unprecedented Scale. Gen AI has created a paradise for fraudsters, said Joel Winteregg, CEO of Vyntra. Just as Interpol coordinates across borders to dismantle criminal networks, Winteregg said banks must operate as a unified intelligence network, because the fraud operations targeting them already do.…
-
Zimbabwe Boosts Cybersecurity as AI-Driven Cyber Fraud Surges
Zimbabwe is intensifying efforts to reinforce cybersecurity in Zimbabwe as the nation confronts a rise of digital crime. As internet access expands and digital financial services become more embedded in everyday life, authorities warn that these developments are simultaneously exposing weaknesses in Zimbabwe’s cybersecurity systems. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cyber-fraud-cybersecurity-in-zimbabwe/
-
Gym giant Basic-Fit confirms data on a million members stolen in cyberattack
Names, addresses, dates of birth, and bank details accessed, though not passwords First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/basicfit_breach/
-
In the AI race, a global bank bets on the human touch
Standard Chartered’s technology and security chief, Alvaro Garrido, says AI will transform finance, but the industry’s biggest vulnerabilities lie outside its own walls First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641549/In-the-AI-race-a-global-bank-bets-on-the-human-touch
-
MITRE releases a shared fraud-cyber framework built from real attack data
Financial fraud losses in the United States reached $16.6 billion in 2024, up from $4.2 billion in 2020. Behind those numbers is a structural problem: the teams responsible … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/
-
Anthropic Mythos AI Model Strikes Fear in Trump Administration, U.S. Banks
U.S. Treasury Secretary Scott Bessent and Fed Chair Jerome Powell call a meeting with the CEOs of the largest U.S. banks to caution them of the cybersecurity dangers of Anthropic’s powerful new Mythos Preview frontier AI model, which can quicky identify software vulnerabilities and, in wrong hands, generate exploits for them. First seen on securityboulevard.com…
-
Anthropic Mythos AI Model Strikes Fear in Trump Administration, U.S. Banks
U.S. Treasury Secretary Scott Bessent and Fed Chair Jerome Powell call a meeting with the CEOs of the largest U.S. banks to caution them of the cybersecurity dangers of Anthropic’s powerful new Mythos Preview frontier AI model, which can quicky identify software vulnerabilities and, in wrong hands, generate exploits for them. First seen on securityboulevard.com…
-
Anthropic Mythos AI Model Strikes Fear in Trump Administration, U.S. Banks
U.S. Treasury Secretary Scott Bessent and Fed Chair Jerome Powell call a meeting with the CEOs of the largest U.S. banks to caution them of the cybersecurity dangers of Anthropic’s powerful new Mythos Preview frontier AI model, which can quicky identify software vulnerabilities and, in wrong hands, generate exploits for them. First seen on securityboulevard.com…
-
What are the best practices for managing NHIs securely?
Why is NHI Management Crucial for Cloud Security? How can organizations protect machine identities effectively? Non-Human Identities (NHIs) have become integral to cybersecurity strategies. These machine identities play a significant role, especially in environments where cloud security is paramount. With sectors like financial services, healthcare, and DevOps relying heavily on the cloud, the importance of……
-
What are the best practices for managing NHIs securely?
Why is NHI Management Crucial for Cloud Security? How can organizations protect machine identities effectively? Non-Human Identities (NHIs) have become integral to cybersecurity strategies. These machine identities play a significant role, especially in environments where cloud security is paramount. With sectors like financial services, healthcare, and DevOps relying heavily on the cloud, the importance of……
-
What are the best practices for managing NHIs securely?
Why is NHI Management Crucial for Cloud Security? How can organizations protect machine identities effectively? Non-Human Identities (NHIs) have become integral to cybersecurity strategies. These machine identities play a significant role, especially in environments where cloud security is paramount. With sectors like financial services, healthcare, and DevOps relying heavily on the cloud, the importance of……
-
Can Agentic AI solutions be trusted for financial services?
How Secure Are Your Machine Identities in the Cloud? Have you ever wondered about the security measures in place to protect the machine identities your organization relies on? With the proliferation of cloud services across industries like financial services, healthcare, and travel, the importance of robust machine identity management has never been more evident. Understanding……
-
How safe are NHIs in regulated industries
Can Non-Human Identities Securely Navigate the Complexities of Regulated Industries? Ensuring the safety of Non-Human Identities (NHIs) within regulated industries emerges as a paramount concern. NHIs, essentially machine identities, play a critical role in cybersecurity, particularly in sectors that are under stringent regulatory oversight, such as financial services, healthcare, and travel. These industries face unique……
-
Studies: Banks Penalize Bad Cybersecurity With Higher Rates
CFOs Should Know: Lackadaisical Security Carries a Price. Bad cybersecurity is bad for business. A badly secured business may pay as much as ten extra basis points for a loan than its posture had been up to scratch, find academic studies examining how U.S. banks price debt. The bill for poor cybersecurity could run hundreds…
-
Practical Post-Quantum Transition: Start Now and Here’s How
Bank Cybersecurity Veteran Moona Ederveen-Schneider on Demystifying the Process. Enterprises need to start planning and executing their transition to post-quantum cryptography, and the best way to get started is through tabletop exercises – marshaling internal stakeholders in security, HR, legal and finance, said Moona Ederveen-Schneider, founder of consultancy Resilia Connect. First seen on govinfosecurity.com Jump…
-
The Phishing-as-a-Service Pipeline: How a Scalable Fraud Ecosystem Is Driving Global Attacks
Flashpoint analysts, working with partner financial institutions, have observed a growing number of PhaaS operations operating with a level of coordination and specialization more commonly associated with legitimate software platforms. These ecosystems bring together phishing kit developers, infrastructure providers, spam delivery services, and financially motivated actors into a single, scalable pipeline for fraud. First seen…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
Storm-2755 Uses AiTM Hijacking to Divert Employee Salaries
Hackers are abusing adversary-in-the-middle (AiTM) session hijacking to steal employee salaries in a new “payroll pirate” campaign tracked by Microsoft as Storm-2755 and targeting Canadian users. By hijacking live Microsoft 365 sessions, the group redirects payroll deposits to attacker-controlled bank accounts while bypassing multifactor authentication (MFA) and blending in with normal user activity. The group’s…
-
I Gave 4 AI Agents a Corporate Bank Account. Here’s How I Stopped Them From Draining It.
A technical build log of the Multi-Agent Control Room, where AI agents pay invoices, escalate denials, and every action is identity-governed through OPA policies, RFC 8693 delegation tokens, and the Maverics AI Identity Gateway. Four AI agents share a corporate bank account with spending limits from $0 to $500K, enforced by OPA Rego policies evaluated……
-
What to Know About CyberAv3ngers: The IRGC-Linked Group Targeting Critical Infrastructure
Tags: access, advisory, ai, attack, authentication, automation, backup, cctv, chatgpt, cisa, communications, compliance, control, credentials, crypto, cve, cyber, cybersecurity, data, data-breach, defense, detection, dns, email, exploit, finance, firewall, flaw, government, group, healthcare, infrastructure, intelligence, international, Internet, iot, iran, kev, leak, linux, malicious, malware, mitigation, mitre, monitoring, network, office, openai, password, radius, resilience, risk, router, service, siem, software, strategy, switch, technology, threat, tool, update, vpn, vulnerability, vulnerability-managementAn Iran-affiliated threat group has evolved from defacing water utility displays to deploying custom ICS malware and exploiting Rockwell Automation PLCs across multiple U.S. critical infrastructure sectors. Key takeaways: CyberAv3ngers is a state-directed threat group operating under Iran’s IRGC Cyber-Electronic Command. The U.S. Treasury sanctioned six named officials in February 2024 and the State Department…
-
Hacker stole £700,000 from UK energy company by redirecting payment
The U.K. energy company said a redirected payment meant for a contractor instead landed in a hacker’s bank account. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/09/hacker-stole-700000-from-u-k-energy-company-by-redirecting-payment/
-
Treasury Department announces crypto industry cyber threat sharing initiative
Eligible U.S. digital asset firms and industry organizations “that meet Treasury’s criteria” will be able to receive, at no cost, the same actionable cybersecurity information Treasury regularly shares with traditional U.S. financial institutions. First seen on therecord.media Jump to article: therecord.media/treasury-department-announces-crypto-info-sharing
-
The Web Is Full of Traps, and AI Agents Walk Right into Them
The enterprise is deploying AI agents at a pace that has outrun every security framework written to govern them. These agents don’t just answer questions, they browse websites, retrieve documents, call APIs, execute code, manage email, initiate financial transactions, and spawn sub-agents to tackle complex workflows. They operate autonomously, at machine speed, often with.. First…

