Regions Bank is the eighth U.S. financial institution apparently targeted by a DDoS attack believed to be waged by the hacktivist group Izz ad-Din al-Qassam. Experts say banks should brace for more attacks on the way.
SunTrust Banks is the seventh U.S. financial institution hit by a DDoS attack apparently orchestrated by the hacktivist group Izz ad-Din al-Qassam. The group is threatening to hit Regions Financial Corp. next.
RSA says 30 U.S. banks are potential targets of a massive Trojan attack, and alleged hacktivists say three more institutions will be hit by DDoS attacks this week. How must banks respond to the latest threats?
The hacktivist group known as Izz ad-Din al-Qassam apparently made good on its promise to take down Capital One's online presence. So what does this latest in a series of DDoS attacks mean for other banks?
Major European institutions are not prepared to prevent or respond to online attacks such as those reportedly hitting U.S. institutions, according to fraud and security experts at ENISA and Barclays.
Online attacks aimed at major U.S. banks have helped to heighten industry cooperation and information sharing. But experts say not all attacks are equal, and understanding the motivation behind the attack is key.
An individual claiming to be part of Anonymous, the hacktivist group that has targeted big business and government, seems to have taken aim at small businesses by claiming to have disrupted website host GoDaddy.com.
Is your organization at risk of a hacktivist attack? If so, are you prepared to respond?
The past two years have seen entities such as Sony, the FBI and the Egyptian government fall victim to data leaks, denial of service attacks and plain public embarrassment by hacktivist groups such as Anonymous, LulzSec and...
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
The United Kingdom's Serious Organised Crime Agency, which recently took down 36 websites selling stolen credit and debit card data, was hit May 3 by a distributed denial-of-service attack.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.