article thumbnail

9 Considerations For Hong Kong Banks To Address The STDB Guidelines

Thales Cloud Protection & Licensing

9 Considerations For Hong Kong Banks To Address The STDB Guidelines. To address the escalating cyber risks, the Hong Kong Association of Banks (HKAB) developed and published guidelines for Secure Tertiary Data Backup (STDB). Tue, 10/05/2021 - 06:55. Cyber incidents pose a threat to the stability of the global financial system.

Banking 114
article thumbnail

Russian Cybercrime group is exploiting Zerologon flaw, Microsoft warns

Security Affairs

TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. The TA505 group was involved in campaigns aimed at distributing the Dridex banking Trojan, along with Locky , BitPaymer , Philadelphia , GlobeImposter , and Jaff ransomware families. states Microsoft. We strongly recommend patching.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Mock phishing attacks prep employees to avoid being socially engineered

The Last Watchdog

In 2015, penetration tester Oliver Münchow was asked by a Swiss bank to come up with a better way to test and educate bank employees so that passwords never left the network perimeter. He came up with a new approach to testing and training the bank’s employees – and the basis for a new company, LucySecurity.

article thumbnail

Microsoft warns TA505 changed tactic in an ongoing malware campaign

Security Affairs

pic.twitter.com/mcRyEBUmQH — Microsoft Security Intelligence (@MsftSecIntel) January 30, 2020. TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. Security experts from cyber-security firm Prevailion reported that TA505 has compromised more than 1,000 organizations.

Malware 104
article thumbnail

Anubis, a new info-stealing malware spreads in the wild

Security Affairs

The new malware shares a name with an unrelated family of Android banking malware. — Microsoft Security Intelligence (@MsftSecIntel) August 26, 2020. According to Microsoft, the new piece of malware uses code forked from Loki malware to steal system info, credentials, credit card details, cryptocurrency wallets.

Malware 138
article thumbnail

CISA alert warns of Emotet attacks on US govt entities

Security Affairs

The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542. The infamous banking trojan is also used to deliver other malicious code, such as Trickbot and QBot trojan or ransomware such as Conti (TrickBot) or ProLock (QBot).

article thumbnail

HTML Smuggling technique used in phishing and malspam campaigns

Security Affairs

— Microsoft Security Intelligence (@MsftSecIntel) July 23, 2021. More recently, the HTML smuggling technique was used to deliver the banking Trojan Mekotio , as well as AsyncRAT/NJRAT and Trickbot. HTML smuggling is a highly evasive technique for malware delivery that leverages legitimate HTML5 and JavaScript features.

Phishing 130