Remove industry-news federal-agencies-cyber-report-card
article thumbnail

Fraud and security departments converge on battle against ‘synthetic identities’

SC Magazine

Secretary of the Treasury Janet Yellen, who also served as chair of the Federal Reserve under the Obama administration, speaks during a daily news briefing May 7, in Washington, DC. While the Fed is primarily concerned with the financial sector, the approach can be used against a variety of industries, from insurance to health care.

Banking 90
article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

Data from the Brazilian Federation of Banks registered a considerable increase in crime (such as explosions at bank branches to steal money) and cybercrime (increased phishing and social-engineering attacks) against banking customers and banking infrastructure. Then US Cyber Command took down Trickbot temporarily ahead of the elections.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. Ten years later, KrebsOnSecurity has uncovered new clues about the real-life identity of Rescator. Chang’s.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result. I can increase the sensitivity of reporting on those so that they're not only getting awareness of the issue.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Vamosi: Maybe you remember this: In 2014, researchers Charlie Miller and Chris Valasek succeeded in hacking a Jeep Cherokee while a reporter was driving it on a freeway during rush hour in St Louis, Missouri. ” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry.

Hacking 52
article thumbnail

How to protect your business from supply chain attacks

Malwarebytes

When American store Target found a Trojan designed to steal card details on its POS (point-of-sale) systems in 2013, no one expected that the route into its secure environment was its heating, ventilation, and air conditioning (HVAC) supplier, Fazio Mechanical Services. What is a supply chain attack?

article thumbnail

EP 49: LoL

ForAllSecure

Vamosi: What makes Kyle’s story compelling is that Kyle used to work for a three-letter agency. Hanslovan: Yeah, so my background was in offensive cyber operations. Vamosi: And recently we’ve started to see some of these attacks in the news. So it's the perspective that he brings to the commercial world.