BankInfoSecurity.com
Researchers Out Front Companies for Chinese Intelligence
6 months ago
Beijing-Based Institute Researches Steganography, Forensics, Network Penetration
Beware previously undocumented front companies for China's main intelligence service that appear to be tasked with gathering and developing steganography, digital forensic, network penetration and other cybersecurity tools to serve Beijing's military and intelligence apparatus, warn researchers.
Beware previously undocumented front companies for China's main intelligence service that appear to be tasked with gathering and developing steganography, digital forensic, network penetration and other cybersecurity tools to serve Beijing's military and intelligence apparatus, warn researchers.
Free Healthcare 'Toolkit' Ranks and Maps Third-Party Risk
6 months ago
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk
Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those difficulties.
Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those difficulties.
EU Unveils AI Tech Sovereignty Plans
6 months ago
AI Strategies Seeks to Bolster Its Position in the Global AI Race
The European Union is pledging $1 billion euros to boost a continental vision of artificial intelligence amid mounting fears the trading bloc is falling behind on research and adoption into the cutting edge technology. "We will help speed up the process," said the European Commission president.
The European Union is pledging $1 billion euros to boost a continental vision of artificial intelligence amid mounting fears the trading bloc is falling behind on research and adoption into the cutting edge technology. "We will help speed up the process," said the European Commission president.
Arrests Underscore Fears of Teen Cyberespionage Recruitment
6 months ago
Telegram Used to Lure Teen Recon Recruits
The late September arrest of two teenagers in the Netherlands on suspicion of capturing Wi-Fi signals for pro-Russian hackers has sparked warnings from security analysts over a digital drive for low-skill reconnaissance tasks by nation-state spymasters.
The late September arrest of two teenagers in the Netherlands on suspicion of capturing Wi-Fi signals for pro-Russian hackers has sparked warnings from security analysts over a digital drive for low-skill reconnaissance tasks by nation-state spymasters.
Deloitte Bets Big on AI Despite Fake Citations in Report
6 months ago
Firm Deploys Claude for Staff, Refunds Australian Government Over AI Errors
Deloitte will embed Anthropic's Claude across its workforce despite flaws in a report from a government client that its analysts produced work with the help of generative artificial intelligence, costing the company thousands of dollars.
Deloitte will embed Anthropic's Claude across its workforce despite flaws in a report from a government client that its analysts produced work with the help of generative artificial intelligence, costing the company thousands of dollars.
Hospital Insider Breach Lasted 10 Years, Led to FBI Inquiry
6 months ago
Texas-Based Harris Health Says FBI Just Gave Green Light to Notify 5,000 Patients
Harris Health is contacting 5,000 patients about a breach involving a former employee who improperly accessed electronic health records for over a decade. The Texas health entity said it discovered and reported the incident four years ago to the FBI, which just gave the green light for notification.
Harris Health is contacting 5,000 patients about a breach involving a former employee who improperly accessed electronic health records for over a decade. The Texas health entity said it discovered and reported the incident four years ago to the FBI, which just gave the green light for notification.
Germany Under Pressure to Oppose EU Chat Control Proposal
6 months ago
Signal and Rights Groups Urge Berlin to Reject CSAM Proposal Ahead of Key EU Vote
The German federal government is under pressure to withdraw support for a European Union content scanning proposal that critics argue poses large-scale privacy risks. The EU Justice and Home Affairs Council is set to vote Oct. 14 on a regulation called Chat Control.
The German federal government is under pressure to withdraw support for a European Union content scanning proposal that critics argue poses large-scale privacy risks. The EU Justice and Home Affairs Council is set to vote Oct. 14 on a regulation called Chat Control.
Kaseya Buys Inky to Expand Email Threat Detection for MSPs
6 months ago
Email Security Acquisition Aims to Bring Cross-Platform Data to Phishing Defense
Kaseya’s acquisition of Inky reflects the need for broader platform integration in email security. With phishing attacks becoming more subtle, founder and CEO Dave Baggett says access to login data and other platform signals is critical for threat detection.
Kaseya’s acquisition of Inky reflects the need for broader platform integration in email security. With phishing attacks becoming more subtle, founder and CEO Dave Baggett says access to login data and other platform signals is critical for threat detection.
Hackers Exploit RMM Tools to Deploy Malware
6 months ago
Attacks on RMM Tools Surged in 2025, With 51 Solutions Flagged as Targets
Cybercriminals are hijacking trusted remote monitoring and management tools to bypass defenses, gain persistent access and quietly stage ransomware attacks. Experts warn MSPs and enterprises that supply chain exposure amplifies the scale of these intrusions.
Cybercriminals are hijacking trusted remote monitoring and management tools to bypass defenses, gain persistent access and quietly stage ransomware attacks. Experts warn MSPs and enterprises that supply chain exposure amplifies the scale of these intrusions.
Why Veeam Is Eyeing a $1.8B Buy of AI Security Firm Securiti
6 months ago
Deal Would Boost Veeam's Cyber Footprint as Data Protection Vendor Valuations Surge
Bloomberg reported that data protection and ransomware recovery giant Veeam is in advanced talks to buy DSPM and AI security vendor Securiti for $1.8 billion, with an announcement coming as soon as this week. The deal would accelerate Veeam's pivot from backup and disaster recovery to cybersecurity.
Bloomberg reported that data protection and ransomware recovery giant Veeam is in advanced talks to buy DSPM and AI security vendor Securiti for $1.8 billion, with an announcement coming as soon as this week. The deal would accelerate Veeam's pivot from backup and disaster recovery to cybersecurity.
Stronger Oversight Needed as Healthcare Risks Multiply
6 months ago
The Edmund Group's Adler on Managing Third- and Fourth-Party Risk in Healthcare
Healthcare organizations face growing risks from data distribution, vendor dependencies and global instability. Steven Adler, partner at The Edmund Group, discusses practical steps to strengthen vendor oversight and resilience.
Healthcare organizations face growing risks from data distribution, vendor dependencies and global instability. Steven Adler, partner at The Edmund Group, discusses practical steps to strengthen vendor oversight and resilience.
Jaguar Land Rover Slowly Starts Making Cars Again
6 months ago
Manufacturer Resumes Operations at Wolverhampton Unit
British car maker Jaguar Land Rover began on Monday a phased restoration of operations following a month of cyberattack-induced idleness. Fears of large-scale job losses at the car manufacturer and its extensive network of suppliers led the U.K. government to guarantee a 1.5 billion pound loan.
British car maker Jaguar Land Rover began on Monday a phased restoration of operations following a month of cyberattack-induced idleness. Fears of large-scale job losses at the car manufacturer and its extensive network of suppliers led the U.K. government to guarantee a 1.5 billion pound loan.
EyeMed Agrees to Pay $5M to Settle Email Breach Litigation
6 months ago
2020 Hack Has Cost EyeMed About $12.6M in Multiple Regulatory Fines, Settlements
Benefits provider EyeMed Vision Care has agreed to pay $5 million and improve its security practices to settle class action litigation involving a 2020 phishing breach. The incident has been the subject of previous multimillion dollar settlements and enforcement actions by multiple state regulators.
Benefits provider EyeMed Vision Care has agreed to pay $5 million and improve its security practices to settle class action litigation involving a 2020 phishing breach. The incident has been the subject of previous multimillion dollar settlements and enforcement actions by multiple state regulators.
Discord Vendor Hack Exposes ID Data in Ransom Bid
6 months ago
Proliferating Age Verification Systems a Hacker Target
A vendor breach linked to Discord exposed government ID uploads used in age verification, raising alarms among privacy experts who warn that third-party data collection systems are becoming high-value targets amid rising legislative mandates for online age checks.
A vendor breach linked to Discord exposed government ID uploads used in age verification, raising alarms among privacy experts who warn that third-party data collection systems are becoming high-value targets amid rising legislative mandates for online age checks.
What to Look for in a Fractional CISO
6 months ago
A Proven Fractional CISO Can Help Close Leadership Gaps and Strengthen Resilience
Hiring a fractional CISO gives your business the executive security leadership it needs - without the full-time cost. But not all providers are equal. Knowing how to evaluate talent, provider stability and delivery is key to ensuring lasting value, trust and resilience.
Hiring a fractional CISO gives your business the executive security leadership it needs - without the full-time cost. But not all providers are equal. Knowing how to evaluate talent, provider stability and delivery is key to ensuring lasting value, trust and resilience.
Attackers No Longer Break In: AI Simply Lets Them Assume Your Identity
6 months ago
Fraud to Compliance: How Banks Use AI for Resilient Security
6 months ago
Financial Institutions Break Down Silos to Combat Faster, AI-Powered Threats
Banks face AI-powered fraud attacks and stricter compliance demands. Unified platforms that integrate security, fraud detection and compliance help institutions respond faster while empowering human analysts to focus on strategic decisions.
Banks face AI-powered fraud attacks and stricter compliance demands. Unified platforms that integrate security, fraud detection and compliance help institutions respond faster while empowering human analysts to focus on strategic decisions.
Voluntarily Retirement Keeps Eluding Ransomware Attackers
6 months ago
What's Left After Raking In Millions From Other People's Blood, Sweat and Tears?
Things that continue to elude scientific observation: the Loch Ness Monster, Bigfoot and the ransomware hacker who voluntarily chose retirement. "There's no such thing as 'retirement' in cybercrime," despite some ransomware hackers dangling promises to leave the field.
Things that continue to elude scientific observation: the Loch Ness Monster, Bigfoot and the ransomware hacker who voluntarily chose retirement. "There's no such thing as 'retirement' in cybercrime," despite some ransomware hackers dangling promises to leave the field.
Career Spotlight: White Hat Hackers in an Automated World
6 months ago
Pentesting Tools Uncover Vulnerabilities but White Hat Skills Are Still in Demand
Automated pentesting tools offer faster visibility and robust integration with daily security operations, but automation doesn't eliminate the need for humans in the loop. Automation raises the baseline for vulnerability management and changes what white hat hackers need to know to stay relevant.
Automated pentesting tools offer faster visibility and robust integration with daily security operations, but automation doesn't eliminate the need for humans in the loop. Automation raises the baseline for vulnerability management and changes what white hat hackers need to know to stay relevant.
Checked
7 hours 17 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed