Payment Fraud Detection and Prevention: Here's All To Know

Payment Fraud Detection and Prevention: Here's All To Know

Key takeaways: With AI technology, payment fraud and fraud prevention have become more complex and sophisticated. Both financial data owners and businesses that accept illegal payments are directly affected by payment fraud. The best payment fraud prevention strategy requires careful risk assessment, planning, implementation, incident response preparation, and documentation. What is payment fraud? Payment fraud is the unauthorized use of an individual’s financial information to conduct illegal transactions. The overall strategy is to deceive individuals…

Read More

The threat of phishing attacks and law enforcement’s role (Part 1)

The threat of phishing attacks and law enforcement’s role (Part 1)

In today’s digital world, cybercriminals are constantly developing new techniques to exploit individuals, businesses and government institutions. One of the most prevalent and damaging forms of cybercrime is phishing — a social engineering tactic used to deceive people into providing sensitive information such as login credentials, financial data and personal details. With phishing attacks evolving in complexity, law enforcement agencies must take proactive measures to combat this threat while emphasizing the need for comprehensive cyber…

Read More

Microsoft Adds Even More AI to Its Security Copilot

Microsoft Adds Even More AI to Its Security Copilot

Vasu Jakkal, corporate vice president, Microsoft Security. Image: Microsoft Microsoft is raising the bar in the cybersecurity game with a new wave of AI-driven security agents. The company announced an expansion of its Microsoft Security Copilot, introducing six AI agents designed to tackle cyber threats head-on. These agents, set to launch in April 2025, will assist overwhelmed security teams in handling phishing attacks, data breaches, and identity threats. Cyberattacks have reached unprecedented levels, with Microsoft…

Read More

Medusa Ransomware: FBI & CISA Urge Immediate Action

Medusa Ransomware: FBI & CISA Urge Immediate Action

Image: DC_Studio/Envato Elements Federal cybersecurity officials are raising red flags over a surge in attacks by the Medusa ransomware group. First detected in June 2021, the group has gained traction recently by using basic but effective methods — like phishing emails and exploiting outdated software — to break into systems and hold data hostage. In a joint advisory released last week, the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and…

Read More

Managing risks in an evolving cybersecurity environment

Managing risks in an evolving cybersecurity environment

In today’s digital landscape, the rise of mobile device usage has made enterprises increasingly vulnerable to fraud. Recent research indicates that 76% of enterprises lack sufficient protection against voice and messaging fraud. This gap in security has become a critical vulnerability as smishing (SMS phishing) and vishing (voice phishing) surge following the recent developments in AI technology, which allows fraudsters to target more victims with increased sophistication. With 61% of enterprises reporting significant financial losses…

Read More

Sneaky Log Phishing Scheme Targets Two-Factor Security

Sneaky Log Phishing Scheme Targets Two-Factor Security

Security researchers at French firm Sekoia detected a new phishing-as-a-service kit targeting Microsoft 365 accounts in December 2024, the company announced on Jan. 16. The kit, called Sneaky 2FA, was distributed through Telegram by the threat actor service Sneaky Log. It is associated with about 100 domains and has been active since at least October 2024. Sneaky 2FA is an adversary-in-the-middle attack, meaning it intercepts information sent between two devices: in this case, a device…

Read More

Protect 3 Devices With This Maximum Security Software

Protect 3 Devices With This Maximum Security Software

TL;DR: Protect your privacy on three devices with a 1-year subscription to Trend Micro Maximum Security for $19.99 (reg. $49.99). Cyber threats have become more sophisticated, and even cautious users can find themselves vulnerable to ransomware attacks, phishing schemes, and identity theft. A single click on the wrong link or a cleverly disguised email can lead to encrypted files, stolen credentials, or compromised accounts. Tech-savvy users know how to spot the signs of a scam…

Read More

Midnight Blizzard Escalates Spear-Phishing Attacks

Midnight Blizzard Escalates Spear-Phishing Attacks

Microsoft Threat Intelligence has uncovered a new attack campaign by Russian threat actor Midnight Blizzard, targeting thousands of users across over 100 organizations. The attack leverages spear-phishing emails with RDP configuration files, allowing attackers to connect to and potentially compromise the targeted systems. The attack campaign targeted thousands of users in higher education, defense, non-governmental organizations, and government agencies. Dozens of countries have been impacted, particularly in the U.K., Europe, Australia, and Japan, which is…

Read More

Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More
1 2 3 15