Expectations for AML Responsible Officers and their operational teams are increasing in response to the combination of new techniques for money laundering, organised crime, geopolitical issues and new actors. To meet these increased expectations, operational resilience and sustainability using intelligent analytics...
A surprising improvement in loss ratios for cyber insurance providers in 2021 means the rapid rise in premiums might at last subside later this year. The loss ratio declined for the first time since 2018 despite the frequency and severity of claims filed for cyberattacks increasing again in 2021.
New legislation mandating cyber incident reporting for critical infrastructure providers within 72 hours, and the reporting of ransom payments within 24 hours, is "groundbreaking," says former National Security Agency deputy commander Tim Kosiba, CEO of security firm bracket f.
Researchers discovered a new social engineering-heavy malware campaign focused on defrauding employees in West Africa's banking sector. Although this campaign is not exactly new, it shows a detailed account of what social engineering looks like, according to cybersecurity veteran Tari Schreider.
Microsoft says it has seized control of 65 domains that the ZLoader gang has been using to grow, control and communicate with its botnet. ZLoader, a descendant of the ubiquitous Zeus banking malware, is run by a global, internet-based, organized crime gang operating malware as a service.
U.S. government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices.
Accenture's new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response.
The latest edition of the ISMG Security Report analyzes the latest cyberthreats to the energy sector as Russia's invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.
Attempts to compromise digital wallets are increasing every day. Download this case study to accurately identify anomalies in payments transactions that indicates an account at risk.
In this case study:
Learn how ‘Smart ID’ detects fraudulent accounts;
What deep connection analysis technologies are;
How...
The LexisNexis® Risk Solutions Cybercrime Report analyzes transaction and attack patterns from billions of global online transactions. Over the period of 6 months, we analyzed 35.5 billion transactions to help us develop industry-leading fraud prevention solutions.
This report details the anatomy of global fraud...
Download this whitepaper to dive into how organizations can build next-generation fraud defences using layers of defense to detect application fraud.
Read on topics including:
How to leverage intelligence across multiple channels;
Analysis on behavioural biometrics and their uses;
High risk patterns of...
As organizations are adapting to rapid increases in digital transformation and the use of cryptocurrency, which has revolutionized how payments, investments, and banking are done, this means fraudsters are even more hard at work to exploit weaknesses.
The cryptocurrency landscape operates under increased risk of...
A yearlong joint operation by law enforcement agencies across several countries led to the shuttering of darknet marketplace RaidForums and the seizure of three domains hosting the website. Its 21-year-old alleged founder and two unidentified co-conspirators have also been arrested.
A breach involving the compromise of a single user's email account at an Illinois-based multispecialty clinic has affected nearly 503,000 individuals - one of the largest breaches reported so far this year to federal regulator. How can other entities avoid similar email security incidents?
Targeted attacks on a Ukrainian energy facility have been confirmed by CERT-UA. In a joint operation carried out by the Ukrainian CERT with security companies Microsoft and Eset, it was found that an ICS-capable malware and several regular disk wipers were used in the attack.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.