Join us for an informative webinar session as we dive into the hard truth of phishing attacks. Phishing has evolved to be more precise and deceptive than ever before, with the influx of mobile devices, screen sizes and many other sophisticated schemes tricking users into divulging information that can compromise...
With fraudsters evolving their tactics and tricking a growing number of people with authorized payment scams, it's time for banks and security solution providers to explore new ways to protect consumers who are left holding the bag, says Ian Mitchell, managing partner at Omega FinCrime.
Compromised accounts may be the most dangerous email threat that organizations face. Once an account has been compromised, it can be used to execute additional attacks—providing threat actors a variety of opportunities to steal funds and sensitive information.
And because the messages are being sent from the...
Fighting fraud is not dissimilar to a child’s connect the dots activity. Instead of dragging a crayon from one strategically numbered dot to another, fraud fighters are connecting online signals. HUMAN’s Satori Threat Intelligence & Research team works with HUMAN’s immense internet visibility to paint these...
The Abnormal Security team just launched a new threat intel site named Abnormal Intelligence. Crane Hassold shares resources available, including an attack library, semi-annual threat intel reports, a glossary and exclusive insights from the Abnormal team.
In this ebook with Information Security Media Group,...
If there’s anything 2022 can teach us, it’s that fincrime Is unpredictable.
This year has been shaped by rapidly changing fraud activities and scams… and increasingly brazen fraudsters. Neither individuals, businesses, government entities, nor financial institutions (FIs) are exempt from the velocity and...
Fraudsters are using tried-and-true tactics such as check washing as well as Zelle scams and a host of insider threats to scam banks and their customers. Frank McKenna, chief fraud strategist at Point Predictive and author, explains why fraud is on the rise and the steps banks can take to stop it.
In the modern world, we log in and out of more accounts than we can keep a count of. During and after logging in, these windows provide tenacious fraudsters the chance to create fake accounts, and compromise legitimate user accounts.
There is a number of ways to counter these fraudsters, one such way is the...
As budgets tighten in anticipation of economic hardships, cybersecurity threats only continue to grow. Bill Bernard, CISSP of Deepwatch, advises security leaders to consider how senior management and the board view cybersecurity and then adjust how you prioritize people, technology and managed services.
In this...
Uber is probing a hack attack after an intruder appeared to breach multiple internal systems, using the company's Slack messaging app to announce: "I am a hacker and Uber has suffered a data breach." The ride-hailing service has taken multiple systems offline while it investigates.
Credential phishing attacks represent a huge threat to organizations as a well-crafted (or even somewhat realistic-looking) phishing email can trick an employee into providing login credentials.
In our threat report covering data from January-June 2022, Abnormal Security found a 48% increase in email attacks over...
The latest ISMG Security Report discusses a new phishing-as-a-service toolkit designed to bypass multifactor authentication, the decision by Lloyd's of London to exclude nation-state attacks from cyber insurance policies, and challenges at Okta after it acquired customer identity giant Auth0.
Digital identities a – particularly the TLS certificates throughout your organization – are used by
machines to authenticate machine-to-machine communications. But they also protect machines
through consistent, trusted encryption.
When these machine identities fail, organizations experience outages. Even...
Cloud collaboration suites like Microsoft 365 are critical to business success, but have become significant entry points for potential exploitation. Just as your team relies on email and collaboration tools to accomplish their goals, so too do sophisticated threat actors. And while the built-in security of Microsoft...
Attackers are attempting to reset the passwords of some DigitalOcean customers, the cloud infrastructure provider says. The email addresses of these customers were likely exposed in a data breach involving Mailchimp, which provided transactional email services for DigitalOcean.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.