TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

Our team is closely monitoring TrickBot’s developing capabilities, including its new cross-channel attacks using the TrickMo component.

The post TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany appeared first on Security Intelligence.

Continue reading TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

Emotet SMiShing Uses Fake Bank Domains in Targeted Attacks, Payloads Hint at TrickBot Connection

Before a short lull in mid-February, Emotet was in the midst of a rise in activity that has been apparent since late 2019 — in terms of both spam and infecting potential victims via SMiShing attacks.

The post Emotet SMiShing Uses Fake Bank Domains in Targeted Attacks, Payloads Hint at TrickBot Connection appeared first on Security Intelligence.

Continue reading Emotet SMiShing Uses Fake Bank Domains in Targeted Attacks, Payloads Hint at TrickBot Connection

How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Reading Time: 3 minutes The EU’s updated Payment Services Directive, PSD2, will introduce a new technical standard that regulates strong customer authentication (SCA).

The post How Will Strong Customer Authentication Impact the Security of Electronic Payments? appeared first on Security Intelligence.

Continue reading How Will Strong Customer Authentication Impact the Security of Electronic Payments?

From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses

Reading Time: 6 minutes Here are the top five ATM security vulnerabilities that X-Force Red, IBM Security’s team of veteran hackers, has uncovered during its many years of performing ATM penetration tests.

The post From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses appeared first on Security Intelligence.

Continue reading From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses

How a Cunning Remote Overlay Malware Met Its Match

A remote overlay malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling.

The post How a Cunning Remote Overlay Malware Met Its Match appeared first on Security Intelligence.

Continue reading How a Cunning Remote Overlay Malware Met Its Match

New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep

Cybersecurity researchers today disclosed details of two newly identified Magecart attacks targeting online shoppers of bedding retailers MyPillow and Amerisleep.

Magecart is an umbrella term researchers gave to at least 11 different hacking groups th… Continue reading New MageCart Attacks Target Bedding Retailers My Pillow and Amerisleep

How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education

As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering.

The post How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education appeared first on Security Intelligence.

Continue reading How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education

How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

If you’ve ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers’ behavioral patterns.

The post How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud appeared first on Security Intelligence.

Continue reading How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

Why Limor Golan Works Hard to Make Security Operations Easier

Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.

The post Why Limor Golan Works Hard to Make Security Operations Easier appeared first on Security Intelligence.

Continue reading Why Limor Golan Works Hard to Make Security Operations Easier

How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Shir Levin used to report on government and law, but her journalism career wasn’t data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.

The post How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud appeared first on Security Intelligence.

Continue reading How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud