Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Deep dive into a FIN8 attack – A forensic investigation

Jul 27 by Martin Zugec

During a recent investigation, our researchers encountered a new version of the BADHATCH malware used by the well-known threat actor, FIN8. We previously reported that FIN8 was working on a new version of the BADHATCH malware - and this recent attack supports our findings and conclusions. FIN8 is known for taking extended breaks to improve their tactics, techniques, and procedures (TTPs) which increases their success rate. With each new version of their toolkit, they start with small tests on a limited pool of victims before launching a full-scale attack.

Read More

Finance Sector Faces ‘Extreme but Plausible’ Cyber Threats

Jan 25 by Bob Violino
  • Financial services firms are major targets of cyber attacks
  • A recent report describes six “extreme but plausible” future cyber threats finance firms need to be aware of when thinking about which industries are prime targets for cyber security breaches, financial services certainly comes to mind. 
Read More

Bank of Valletta Shuts Down Operations after Hackers Attempt 13 Million EUR Transfer Overseas

Feb 15 by Luana Pascu

Financial services organizations operate with high volumes of valuable data, making them an attractive target for hackers. They are vulnerable to scams, fraud and banking Trojans, so data security in this sector is critical. IT executives struggle to optimize cybersecurity, as they often deal with low budgets and a lack of skilled workers to implement better security. These are top roadblocks, especially as open banking exposes their data and infrastructure to third-party vulnerabilities.

Read More

Top Security Challenges for the Financial Services Industry in 2018

Dec 31 by Luana Pascu

The financial services industry falls victim to cybersecurity attacks 300 times more often than any other. 47.5% of financial institutions were breached in the past year, while 58.5% have experienced an advanced attack or seen signs of suspicious behavior in their infrastructure, according to a Bitdefender white paper.

Read More

Cybersecurity Investment to Shoot Up in Financial Industry in 2019; Top Firms Already Spend $1 Billion

Dec 10 by Luana Pascu

A look back on 2018 shows the financial services industry turned out to be the most at risk, with security incidents and breaches skyrocketing. Top threats to the financial services industry include cloud security and third-party risks, while the most prevalent techniques are DDoS, social engineering, spear-phishing, ransomware and insider threats, according to a Bitdefender white paper.

Read More

Lack of Specialists, Tools, Budget and Knowledge Are the Main Roadblocks for Financial Sector in 2018

Oct 12 by Luana Pascu

The financial services industry has been one of the most targeted in 2018, with third-party risks still the main cause of data breaches in this sector. Almost 50 percent of financial institutions were breached in the past year, found a survey conducted by Bitdefender, while almost 60 percent experienced an advanced persistent attack or seen signs of suspicious behavior in their infrastructure.

Read More

93% of Forbes Global 2000 Don’t Stress Vulnerability Disclosure Policies, Says HackerOne Report

Sep 18 by Luana Pascu

As many as 93 percent of companies in the Forbes Global 2000 list don’t include a vulnerability disclosure policy among top business concerns, according to HackerOne’s The Hacker-Powered Security Report 2018, a deep dive into bug bounty and vulnerability disclosure in the financial services and insurance industries.

Read More

Bitdefender Investigates Advanced Cyberattacks on Financial Institutions, Warns That Hackers Target Eastern European and Russian Banks

Bitdefender has recently investigated a series of advanced cyberattacks aimed at financial institutions, designed to covertly exfiltrate massive amounts of money in coordinated strikes.

Read More

Insider Threats Remain #1 Security Headache for Organizations, Research Shows

Apr 27 by Luana Pascu

Businesses cannot come up with a mitigation strategy to efficiently detect, identify and manage insider threats, according to research from the Ponemon Institute, so they risk the loss of critical confidential data and resources, network shutdown and reputational damage. In the past year, 159 organizations from the United States, Canada, Europe, Middle East, Africa, and the Asia-Pacific region dealt with 3,269 security breaches caused by insider threats due to plain negligence.  

Read More

Financial Services Remains Hackers’ Most-Targeted Industry for Second Straight Year

Apr 23 by Luana Pascu

The ease-of-exploit rating has made the financial sector a cybercrime magnet for years, especially for targeted extortion attacks. The industry has fallen victim to numerous security breaches, data exfiltration hacks, DDoS attacks taking down global online operations and disrupting services, and has lost millions to malware and ransomware attacks. So what’s next?

Read More

Changes to Data Breach Notifications in the Air

Mar 14 by George V. Hulme

Ever since the first data breach notification law went into effect July 1, 2003 in California (SB 1386), there has been controversy surrounding what types of data being exposed should trigger data breach notifications, who should be notified, and how quickly they should be notified. In fact, it’s become somewhat of a mess.

Read More

The Five Attributes Needed to Succeed at DevSecOps

Feb 27 by George V. Hulme

It’s hard to believe but the conversation around how security fits in DevOps has been going on for years. It was in 2012 when Gartner analyst Neil MacDonald wrote his blog DevOps Needs to Become DevOpsSec. In this blog MacDonald wrote “DevOps seeks to bridge the development and operations divide through the establishment of a culture of trust and shared interest among individuals in these previously siloed organizations. However, this vision is incomplete without the incorporation of information security, which represents yet another silo in IT.”

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets

Posts by Month