Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

Contributed to this research: Segev Fogel, Amir Gendler and Nethanella Messer.   IBM Trusteer researchers continually monitor the evolution and attack tactics in the banking sector. In a recent analysis, our team found that an Ursnif (aka Gozi) banking Trojan variant is being used in the wild to target online banking users in Italy with […]

The post Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy appeared first on Security Intelligence.

Continue reading Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

The Hottest Cybersecurity Must-Reads for the Busy Security Practitioner

You’re busy. We get that. Let’s suppose you’re like most of your colleagues in security. In that case, it’s almost like Groundhog Day. It starts with chasing the latest threat and protecting your company or agency from attacks. It ends with you wondering where the last eight (or more) hours went. This leaves you little […]

The post The Hottest Cybersecurity Must-Reads for the Busy Security Practitioner appeared first on Security Intelligence.

Continue reading The Hottest Cybersecurity Must-Reads for the Busy Security Practitioner

Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects

How many online accounts did you open during the pandemic? A new survey examines the impact of this digital surge on risk to consumers and businesses alike. The unexpected nature of a global pandemic that washed over the entire world left everyone scrambling to maintain their daily activities and work as best they could. With […]

The post Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects appeared first on Security Intelligence.

Continue reading Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects

5 Global Supply Chain Security Threats (and How to Handle Them)

In December 2020, a nation-state attack on the SolarWinds network management system compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security. With costs likely to run into the billions, this breach was one of the biggest incidents in recent years — but it won’t be the last. […]

The post 5 Global Supply Chain Security Threats (and How to Handle Them) appeared first on Security Intelligence.

Continue reading 5 Global Supply Chain Security Threats (and How to Handle Them)

Cyber Gangs: Who Are They in 2021 and What Do They Want?

Cyber crime gangs have been operating for years, but in recent months, they’ve shifted tactics. They’ve embraced new technologies, exploited new opportunities, delivered new payloads and sought out new targets. Their aim is to maximize the amount of money they can collect through cyber crime. Gangs, such as Cosmic Lynx, Exaggerated Lion, Fin7 and Florentine […]

The post Cyber Gangs: Who Are They in 2021 and What Do They Want? appeared first on Security Intelligence.

Continue reading Cyber Gangs: Who Are They in 2021 and What Do They Want?

Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage

Some online experiences are so bad that 25% of users abandon an application after first use and never return. To avoid this retention problem, you should offer better engagement to your customers during their authentication and authorization process. Engage is the second of four building blocks essential for successful consumer identity and access management, or […]

The post Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage appeared first on Security Intelligence.

Continue reading Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage

5 Unique Online Scams and How to Defend Against Them

The possibility of an online scam can be an ever-changing problem for individuals and businesses. If someone clicks on a virus-laden email while employed in a data-heavy business, their stolen data could lead to a compromise to the business overall. Because of this, knowing what your employees might encounter in their day to day is […]

The post 5 Unique Online Scams and How to Defend Against Them appeared first on Security Intelligence.

Continue reading 5 Unique Online Scams and How to Defend Against Them

Taking Time Off? What Your Out of Office Message Tells Attackers

As more people are vaccinated and free to live a more normal life again, vacation plans, trip pictures and conference hashtags will flood social media sites. Phone calls and emails to colleagues will be met with out of office (OOO) messages. You might feel happy for that person, or maybe a little jealous that they […]

The post Taking Time Off? What Your Out of Office Message Tells Attackers appeared first on Security Intelligence.

Continue reading Taking Time Off? What Your Out of Office Message Tells Attackers

User Behavior Analytics: What It Is and How It Advances Digital Security

Organizations are struggling to pinpoint threats that come from real user accounts. Take insider threats, as an example. In a 2020 report, 68% of IT and security experts felt their employers were somewhat or very at risk to insider attacks. Over half (53%) said it had become at least somewhat harder to detect an insider attack […]

The post User Behavior Analytics: What It Is and How It Advances Digital Security appeared first on Security Intelligence.

Continue reading User Behavior Analytics: What It Is and How It Advances Digital Security

Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a […]

The post Synthetic Identity Theft: When Everybody Knows Your Name appeared first on Security Intelligence.

Continue reading Synthetic Identity Theft: When Everybody Knows Your Name