Magecart Attacks Continue to ‘Skim’ Software Supply Chains

Did your company or e-commerce firm recently buy third-party software from a value-added reseller (VAR) or systems integrator? Did you vet the vendor code? If not, you could be at risk for a Magecart group attack. Magecart is an association of threat actor groups who target online shopping carts, mostly from within the e-commerce platform […]

The post Magecart Attacks Continue to ‘Skim’ Software Supply Chains appeared first on Security Intelligence.

Continue reading Magecart Attacks Continue to ‘Skim’ Software Supply Chains

Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a […]

The post Synthetic Identity Theft: When Everybody Knows Your Name appeared first on Security Intelligence.

Continue reading Synthetic Identity Theft: When Everybody Knows Your Name

Retail Cybersecurity: How to Protect Your Customer Data

In the early days of the pandemic, many retailers quickly launched e-commerce stores for the first time. Others expanded their offerings, such as adding online ordering with curbside pick-up. Within only a few months, the pandemic accelerated the shift to e-commerce stores by five years. This points to the need for increased retail cybersecurity.  The result […]

The post Retail Cybersecurity: How to Protect Your Customer Data appeared first on Security Intelligence.

Continue reading Retail Cybersecurity: How to Protect Your Customer Data

Cyberattackers Serve Up Custom Backdoor for Oracle Restaurant Software

The modular malware is highly sophisticated but may not be able to capture credit-card info. Continue reading Cyberattackers Serve Up Custom Backdoor for Oracle Restaurant Software

Data breach at online guitar lesson platform may have exposed user credit card information

TrueFire, a leading online guitar-tutoring platform, has suffered a “Magecart-style” security incident that may have exposed customers’ personal identifiable information and credit card numbers. The facts The data breach was discovere… Continue reading Data breach at online guitar lesson platform may have exposed user credit card information

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government have increased dramatically over the last several years. What is it about municipal organizations and governments that makes them such attractive targets?

The post Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government appeared first on Security Intelligence.

Continue reading Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Staying Vigilant About Retail Security Does Not End on Black Friday

As one of the most targeted industries, retailers should be taking measures to build a secure infrastructure ahead of the holidays and keep retail security evolving and maturing all year long.

The post Staying Vigilant About Retail Security Does Not End on Black Friday appeared first on Security Intelligence.

Continue reading Staying Vigilant About Retail Security Does Not End on Black Friday

Macys.com checkout page hacked; customers advised to be vigilant of fraud

American department store chain Macy’s has suffered an embarrassing data breach where hackers gained access to customers’ personal and financial information, including credit card numbers and even card security codes. In a letter to affecte… Continue reading Macys.com checkout page hacked; customers advised to be vigilant of fraud

How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Reading Time: 3 minutes The EU’s updated Payment Services Directive, PSD2, will introduce a new technical standard that regulates strong customer authentication (SCA).

The post How Will Strong Customer Authentication Impact the Security of Electronic Payments? appeared first on Security Intelligence.

Continue reading How Will Strong Customer Authentication Impact the Security of Electronic Payments?