fraud, time, cybersecurity data Emotet Spring4Shell ransomware API security cyberattack threats fraud

Fraud Detection: Time is Not on Our Side

Fraud often takes place through social engineering against customers logging in from where they always log in, from a device they have always used ...
Security Boulevard
How to make the best company-wide BYOD Policy

How to make the best company-wide BYOD Policy

Flexible, remote, and hybrid working models have been in the business environment for quite some time now, and the recent health crisis has made it even more commonplace. This has brought up ...

Preparing for the Holiday Ransomware Storm

This article was originally published on Spiceworks. The holiday season is upon us. As we approach the end of 2023, it should be a time for festive cheer for all. Unfortunately for ...
cyber AI, AI attacks, cybersecurity, defense, organization

Software Supply Chain Attackers Targeting Banks, Checkmarx Says

Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry ...
Security Boulevard
PCI-DSS PayPal Visa AI digital payments Security the Price of Convenience in Supply Chain Payments

Elevate Cybersecurity Resilience With PCI-DSS 4.0

Earlier this year, the PCI Security Standards Council revealed version 4.0 of their payment card industry data security standard (PCI-DSS). While organizations won’t need to be fully compliant with 4.0 until March ...
Security Boulevard
Phishing for Financial Fears

Phishing for Financial Fears

Over the last 4 days (as of the writing of this blog) the federal government has seized the assets of […] ...

Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale

The financial services sector is prone to insider abuse and data misuse, including fraud. For global banks and other financial institutions, the cost of a security incident can quickly add up to ...
The Optus Breach: How Bad Code Keeps Happening to Good Companies

The Optus Breach: How Bad Code Keeps Happening to Good Companies

| | Cybersecurity, data, Finance, security
First, let me be clear that I have no insider knowledge. This is my best guess at what occurred, based on publicly available information here and others indicated in references section below.On Thursday ...
How the typical pig butchering scam correspondence starts.

5 tips for spotting and avoiding Pig butchering scams

A new type of scam, called “pig butchering” is gaining momentum. Pig butchering is a unique scam which uses a romance scam script, but with an investment spin on it, where victims ...
Cybersecurity for Startups with Josh Feinblum from Stavvy

Cybersecurity for Startups with Josh Feinblum from Stavvy

Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, ...