Saturday, June 21, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Editorial Calendar » API Security » Defending the Enterprise: New Insights from Banking Industry Experts on Fraud and Cyber Threats

SBN

Defending the Enterprise: New Insights from Banking Industry Experts on Fraud and Cyber Threats

by Jordan Gottlieb on September 17, 2024

As cybercriminals continue to raise the bar in terms of the sophistication of their attacks, as well as forging an easier path to conduct these attacks, the key to weathering this growing storm of cyber threats lies in the detection further up the cyber kill chain. The sooner the detection, the higher the chances your bank has of stopping these attacks before they cause damage to your customers and systems. However, the longer these vulnerabilities remain exposed, the greater the risk – turning what could be a minor assault into a full-scale invasion. 

This urgent need for proactive action was underscored in a recent webinar featuring industry experts Chief Insights Officer Julie Conroy from Datos Insights and Arkose Labs Head of Product Vikas Shetty. We had the honor of diving deep into this and other pressing issues, and their wealth of experience and sharp insights are incredibly valuable as we navigate the complexities of modern cybersecurity in banking. Here are the key takeaways.

From Lone Wolves to Organized Cybercrime

The session kicked off with a stark look at the shifting threat landscape. Vikas explained how cybercrime has evolved from isolated hackers to coordinated crime syndicates using advanced technologies. Banks and other financial institutions now face a significantly expanded threat surface, as attackers deploy sophisticated tools across various endpoints such as APIs. This shift has made traditional security measures less effective, requiring constant vigilance and adaptability.

Techstrong Gang Youtube
AWS Hub

A New Era of Threats 

One of the most eye-opening trends is the rise of cybercrime-as-a-service (CaaS), a fully outsourced entity that generates revenue from bad actors who purchase a subscription for use of the service. Similar to a peer-to-peer (P2P) model, CaaS is an attacker-to-attacker (A2A) model where the CaaS entity provides a hosted software platform that can be used to actively engage in criminal attacks on their subscribers’ behalf, or provides an enabling service assisting subscribers with their own attacks. 

Julie and Vikas illustrated how this model has significantly lowered the entry barriers for cybercriminals. Phishing kits are often purchased for just a few hundred dollars a month, and require little to no technical experience. This has resulted in a troubling increase in account takeover (ATO) attacks and a rise in sophisticated schemes like man-in-the-middle reverse proxy phishing, where phishing emails direct customers to reverse proxy servers that capture real credentials and MFA codes. Similarly, ATO attacks now involve advanced automation and AI, making them more effective and harder to detect. Julie shared data showing that ATO continues to be a major concern globally, with attackers increasingly using AI to enhance phishing schemes and scale attacks.webinar Arkose Labs screengrab

The Growing Concern of API Security 

With the rise of open APIs driven by PSD2 in Europe and similar regulations in North America, API security has rapidly become a top concern for financial institutions. Securing APIs is akin to locking all the doors in a sprawling mansion, yet some doors remain hidden behind walls or beneath staircases. Without a full inventory, financial institutions can’t know which doors are secure and which ones are wide open, leaving room for intruders to slip through unnoticed. 

Julie pointed out that securing these APIs is a complex challenge due to their diverse nature – whether mission-to-mission, process-to-process or those powering websites and mobile apps. Vikas emphasized that no single solution can effectively safeguard all types of APIs, which makes comprehensive protection a daunting task. Many institutions struggle with inventory management and discoverability of their APIs, often leaving potential vulnerabilities unchecked.

This lack of confidence, with 59% of financial institutions still in the dark about their API exposure, highlights a critical vulnerability. As attackers become more sophisticated, even a single overlooked endpoint can lead to catastrophic attacks. Julie reinforced the urgency of addressing this issue, as APIs have quickly become a prime target for cybercriminals. Without a comprehensive, focused approach to API security, financial institutions are leaving themselves open to exploitation.

Fraud in the Era of Real-Time Payments (RTP)

Julie also highlighted a significant trend: fraud attacks that are growing alongside the adoption of real-time payments (RTP) systems. Fraudsters are exploiting faster payment rails to quickly move stolen money through extensive networks of mule accounts, making it increasingly difficult to trace and recover funds. Julie emphasized that these criminals are capitalizing on the vulnerabilities of the end customer, and the speed of transactions exacerbates the challenge of tracing and reversing fraudulent activity.

AI: A Double-Edged Sword

The discussion then turned to the role of AI, and Julie noted that while adversaries are early adopters of AI, using it to develop and scale attacks with greater efficiency, banks are still lagging behind. This is due to the lengthy process large financial institutions face in adopting new technologies, driven by a need for transparency and traceability. For instance, the process of adopting AI in banking involves navigating business cases, legal reviews, IT queues and model risk governance, which slows down the integration of AI compared to its rapid adoption by attackers. On the defensive side, banks are deploying AI in back-office use cases, such as automating claim disputes and triage, but face challenges in applying AI to frontline fraud detection. 

Meanwhile, malicious actors are using AI to create highly convincing phishing schemes and to scale their operations more effectively. The introduction of generative AI into the ecosystem has further amplified these threats, with attackers leveraging advanced AI tools to craft realistic emails and execute more sophisticated fraud tactics. 

Vikas elaborated on the impact of AI, distinguishing between classical machine learning methods and generative AI. While classical AI methods are being used to tackle traditional ATO and fraud issues, generative AI introduces new challenges like impersonation attacks and deep fake frauds. Vikas noted that generative AI’s probabilistic nature makes it less suited for detection scenarios but emphasized that it presents significant concerns due to its potential for creating realistic fake personas and deep fakes.

Navigating the Regulatory Maze 

We also explored the complex regulatory landscape, which plays a crucial role in shaping how financial institutions approach cybersecurity. Julie outlined several key regulations, including FFIEC 2021 update, Dodd-Frank 1033, PCI DSS 4.0, DORA (Digital Operational Resilience Act), NIS II and PSD3, emphasizing that while these regulations provide a baseline for compliance, they should be viewed as minimum standards. Financial institutions should aim to exceed these standards to address the rapidly evolving threat environment effectively. Regulations can help justify investments and propel business cases, but they are not a substitute for a proactive and robust security posture.

Proactive Defense Strategies for Banks 

As we explored solutions, Julie discussed the importance of a nimble control framework. Traditional fraud detection often resembles putting a bucket under a leaky roof after the rain has already started. Proactive defense strategies, on the other hand, are about fixing the roof before the storm hits, ensuring the damage is mitigated before it can even occur. The challenge lies in overcoming operational hurdles and leveraging AI effectively, as the attackers do. Julie stressed that banks adopting AI-driven solutions and faster response mechanisms can significantly improve defenses.

Vikas echoed this sentiment, stressing the need for proactive detection and mitigation strategies. He explained that traditional methods of waiting until after a transaction to analyze and respond are too slow. Modern approaches involve multi-layered security and progressive proofing, where evaluations occur at various points during a transaction, starting at the login or registration stage. This allows for earlier detection of potential threats and minimizes downstream impact.

Join Us for More Insights

The insights shared during our webinar are just the beginning of what’s needed to tackle today’s cybersecurity challenges in banking. To see the actual research Julie shared and to dive deeper into these crucial topics, I encourage you to download the on-demand webinar. 

Sign up for our upcoming webinar Defending the Enterprise – Fusion Realities: Collaboration in the Age of AI on September 26!

 

*** This is a Security Bloggers Network syndicated blog from Arkose Labs authored by Jordan Gottlieb. Read the original post at: https://www.arkoselabs.com/blog/new-banking-insights-fraud-cyber-threats

September 17, 2024September 17, 2024 Jordan Gottlieb account takeover, API security, fraud prevention
  • ← Beyond the Hype (Cycle): Why CDR’s Current Phase Spells Success
  • Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SERIF, And More… →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran Nuclear Sites 
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road
Novel TokenBreak Attack Method Can Bypass LLM Security Features
MY TAKE: Microsoft takes ownership of AI risk — Google, Meta, Amazon, OpenAI look the other way
What are the best practices for MCP security?
Integrating SCIM with Identity Providers: Your Complete Guide to Okta and Azure AD
How the New HIPAA Regulations 2025 Will Impact Healthcare Compliance
Automated Guard Rails for Vibe Coding

Industry Spotlight

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | Yesterday 0
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Blockchain Cloud Security Cybersecurity Data Security Digital Currency Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

June 18, 2025 Jeffrey Burt | 2 days ago 0
Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

Trump’s TikTok Tarry — Yet Again, Ban-Can Kicked Down the Road

June 18, 2025 Richi Jennings | 2 days ago 0

Top Stories

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
Cybersecurity Featured News Security Boulevard (Original) Social - X Spotlight 

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report

June 19, 2025 Jon Swartz | 1 day ago 0
AWS Makes Bevy of Updates to Simplify Cloud Security
Cloud Security Cybersecurity Featured News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AWS Makes Bevy of Updates to Simplify Cloud Security

June 18, 2025 Michael Vizard | 2 days ago 0
U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam

June 17, 2025 Jeffrey Burt | 3 days ago 0

Security Humor

A pig in a muddy farm field

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×