Billtrust, a cloud-based, business-to-business payment provider, reportedly is continuing to recover from a ransomware attack that crippled its computer systems.
Facebook has removed four networks - three from Iran and one from Russia - after its investigation revealed they were spreading misinformation regarding politics and news related to the 2020 U.S. presidential election. The action is part of a larger effort by the social media firm to clamp down on abuse.
Virtual private network provider NordVPN says an error by its Finish data center provider allowed an attacker to gain control of a server, but it says its broader service was not hacked. One security expert, however, says the attacker would have had "God mode" on one VPN node.
With consumers increasingly turning online to buy electronics, retailers stand to make significant gains in terms of eCommerce revenue. Unfortunately, growing online sales also raise the stakes on eCommerce fraud prevention. This report sheds light on consumer electronics online fraud patterns in, offering retailers...
Tenable ranks highest in the strategy and current offering categories.
"Tenable is a great choice for enterprises looking for a VRM vendor that provides strong prioritization and reporting across device types," according to a Forrester report.
We believe this report reinforces Tenable's Cyber Exposure vision of...
Phishing is a well-known attack vector in the financial and security industry space. The data shows that, in addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period, putting the personal data and banking information of...
Turla, an advanced persistent threat group with apparent ties to Russia, seized attack infrastructure and tools used by OilRig, an Iranian APT group, U.K. and U.S. intelligence agencies have jointly reported. They say Turla used the co-opted infrastructure to conduct its own reconnaissance and attacks.
A British judge has denied WikiLeaks founder Julian Assange's request to delay a five-day hearing, slated to begin Feb. 25, on whether he should be extradited to the United States to face espionage charges.
While it's never been easier to be a consumer, it's never been harder to be a merchant. To help decode the complex eCommerce landscape, we asked 5,000 shoppers to tell us their purchasing habits - how they shop, what makes them loyal, how they view fraud, and what keeps them from completing a purchase.
What you...
Most online retailers spend vast resources protecting their business against chargebacks. But in reality, they're losing a lot more money to false declines than to actual CNP fraud.
Download this guide to:
Understand the scope of false declines: Why eCommerce businesses should care about false declines, the silent...
This guide was created to help merchants see through fraudsters' tricks & protect their business from chargebacks, without compromising the shopping experience.
Download this Guide to:
Boost revenue by learning why many valid orders are mistaken for fraud
Protect brand reputation and improve customer...
ESET researchers have uncovered a new cybercriminal scheme that uses a trojanized version of the Tor browser for stealing bitcoins from darknet users. So far, the scam has netted about $40,000 in virtual currency, the security firm says.
Sodinokibi/REvil appears to be making millions since it seized the ransomware-as-a-service mantle from GandCrab earlier this year. Security firm McAfee says up to 40 percent of every victim's ransom payment - average: $4,000 - gets remitted to the Sodinokibi actor, with "affiliates" keeping the rest.
While the Russian-linked hacking group known as The Dukes, Cozy Bear and APT29 in recent years appeared to have gone somewhat quiet, researchers from ESET report that the hackers have been targeting various European embassies and ministries as part of what the security firm dubs "Operation Ghost."
The latest edition of the ISMG Security Report discusses the shutdown of DeepDotWeb. Plus, dealing with breach fatigue and the Pitney Bowes ransomware attack.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.