Turkish Banking Agency Mandates Better Software Supply Chain Hygiene

Today, application attacks and breaches are often the result of easily exploited – and easily rectified – open source vulnerabilities. While we hope companies would self-regulate their cybersecurity hygiene in our software ...

Financial Institutions Care about Fast Deployments

FSIs Are Under Siege Large financial services institutions (FSIs) supporting thousands of workers have had to accelerate their plans for remote working since March 2020.   In our conversations with FSIs during ...
Rooty Dolphin uses Mekotio to target bank clients in South America and Europe

Rooty Dolphin uses Mekotio to target bank clients in South America and Europe

Key Points  Rooty Dolphin is a threat actor who uses Mekotio to target banks  Mekotio is a banking trojan with Brazilian origins  Rooty Dolphin started targeting South America but moved to Europe some months ago ...
Making the grade graphic 9.16.20

Financial Sector Cybersecurity: How do you compare to your peers?

The post Financial Sector Cybersecurity: How do you compare to your peers? appeared first on Digital Defense, Inc ...
Financial Infographic thumbnail 081220

Financial Cyberthreats: What You Need to Know to Protect Your Business

The post Financial Cyberthreats: What You Need to Know to Protect Your Business appeared first on Digital Defense, Inc ...
Investors Bank Case Study pic 2.1.19

5 Tips for Financial Institutions to Achieve a More Secure Digital Transformation

The post 5 Tips for Financial Institutions to Achieve a More Secure Digital Transformation appeared first on Digital Defense, Inc ...
Newly-discovered Android malware steals banking passwords and 2FA codes

Newly-discovered Android malware steals banking passwords and 2FA codes

Security researchers at Cybereason are warning of a new mobile banking trojan that steals details from financial apps and intercepts SMS messages to bypass two-factor authentication mechanisms. According to experts who have ...

Android Banking Trojans: History, Types, Modus Operandi

One sunny morning, my breakfast was interrupted by a phone call from a friend who is an entrepreneur engaged in the transportation of various goods. He said that $11,000 disappeared from his ...
cybersecurity banks

Cybersecurity at Banks a Different Kind of Holiday Stress

Regardless of how they are made or who may be at fault when fraudulent transactions occur, the buck stops at the desks of cybersecurity professionals working at banks and financial institutions. A ...
Security Boulevard

Google’s Health Record Storage Controversy, US Border Search Ruling, Zelle Scams

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 95 for November 18th 2019: Google’s access to the ...