Governments globally are intensifying anti-scam measures, introducing new guidelines to banks, telecom providers and other key sectors to bolster security controls and mitigate fraud risks for consumers and businesses. Some new frameworks threaten to levy stiff penalties for non-compliance.
Russian national Georgy Kavzharadze, 27, has been sentenced to serve 40 months in U.S. prison after pleading guilty to earning over $200,000 by selling stolen U.S. bank account access credentials via the illicit Slilpp stolen-credential marketplace.
Your secret weapon to combat cyber threats might be just under your nose! Cybercriminals continue to exploit vulnerabilities while upping their game with new and more sinister attack methods. The human firewall is your cybersecurity ace in the hole.\r\n\r\nBut how resilient are your users when it comes to fending off...
Account takeover fraud in the financial services industry is declining in contrast with other industries such as retail and hospitality. Researchers at Human Security attribute the nearly 50% reduction to one of the basic controls in cybersecurity: multifactor authentication.
Abnormal Security co-founder and CEO Evan Reiser explains the company's evolution from email security to comprehensive human behavior security. He highlights new capabilities to protect against account takeovers and the use of AI to monitor SaaS applications such as Salesforce and Slack.
Microsoft\u2019s native and add-on email security capabilities help to protect against basic threats, but they aren\u2019t enough to ensure full protection. Learn how a multi-layered human-centric security strategy can augment Microsoft 365 to defend against modern threats like business email compromise, advanced...
Social engineering and phishing are not just IT buzzwords; they are potent threats capable of causing devastating damage to your organization. Bad actors and the technology they use to infiltrate your defenses are evolving at lightning speed. The only way to safeguard your assets and data is to stay ahead of the game...
In the cloud, a single stolen password can unlock a treasure trove of data. This guide is your CISOcial distancing handbook, teaching you how to keep attackers at arm's length and prevent account takeovers. \r\n\r\n Register now to attend this LIVE webinar where we will deep into topics such as: \r\n\r\n How to cut...
In the cloud, proof of identity is all that you need to access private resources - even if that proof is stolen. \r\n\r\n Welcome to the identity crisis! \r\n\r\n In the case of Microsoft 365, the attack surface is about 345 million identities and counting, making it a tantalizing target for cybercriminals who want...
SIM swap fraud continues to cause substantial financial losses for both consumers and financial institutions, undermining the integrity of the financial ecosystem. In the UAE, the banking industry has incurred considerable losses from SIM swap fraud. But a strategic approach has stopped it.
The digital payment landscape is undergoing transformative growth, with cybersecurity at its core. Dharshan Shanthamurthy,\tCEO at SISA, discussed the urgency of addressing cybersecurity in an industry that is not only lucrative for businesses but also for motivated criminal gangs.
More and more in society, deepfake technology leverages artificial intelligence to create convincing fake audio and video clips and is evolving rapidly. These technologies not only pose significant threats to personal and organizational cybersecurity programs, but also present unique challenges and opportunities in IT...
Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by bad actors? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your...
Rumors are swirling about how the Department of Health and Human Services lost about $7.5 million in grant payments through a series of cyberattacks last year, including speculation over whether the incidents involved sophisticated AI-augmented spear-phishing or more commonplace fraud schemes.
Hackers celebrated the year-end holidays with a malicious "Free Leaksmas" posting on the dark web, releasing 50 million stolen consumer records, including credit card information. Researchers said the leaked data can be used for identity theft and fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.