BankInfoSecurity.com
Webinar | Your CPS is Wide Open: Stop Point Solutions from Failing Defense
3 weeks 3 days ago
Why 47-Day TLS and SSL Certificate Renewal Cycles Alarm CIOs
3 weeks 3 days ago
Visibility Gaps Increase the Risk of Certificate-Driven Outages
Moving to 47-day TLS and SSL certificate renewal cycles by 2029 will turn certificate management into an enterprise risk. "Automation and crypto-governance are now board-level imperatives. Enterprises can prepare for continuous renewal cycles without losing resilience," says Sectigo CEO Kevin Weiss.
Moving to 47-day TLS and SSL certificate renewal cycles by 2029 will turn certificate management into an enterprise risk. "Automation and crypto-governance are now board-level imperatives. Enterprises can prepare for continuous renewal cycles without losing resilience," says Sectigo CEO Kevin Weiss.
ISMG Editors: How AI Is Reshaping Cybersecurity Strategy
3 weeks 3 days ago
Also: Leadership Decisions Shaping Cybersecurity in 2026
Security leaders are heading into 2026 facing growing pressure from AI-driven risks, limited resources and an increasingly complex threat landscape. Sean Mack, who leads ISMG's CXO Advisor practice, joined ISMG editors to discuss how these forces are reshaping security.
Security leaders are heading into 2026 facing growing pressure from AI-driven risks, limited resources and an increasingly complex threat landscape. Sean Mack, who leads ISMG's CXO Advisor practice, joined ISMG editors to discuss how these forces are reshaping security.
Cryptohack Roundup: $7M Trust Wallet Hack
3 weeks 3 days ago
Indian Police Arrests Ex-Coinbase Staffer Over Data Breach Charges
This week, a $7 million Trust Wallet extension hack, arrest of an ex-Coinbase support agent, the U.S. sued alleged perpetrators of a $14M scam, Polymarket hack update, early release scheduled for former Alameda CEO, backlash on Flow's post-exploit rollback plan and Grubhub-linked holiday Bitcoin scam.
This week, a $7 million Trust Wallet extension hack, arrest of an ex-Coinbase support agent, the U.S. sued alleged perpetrators of a $14M scam, Polymarket hack update, early release scheduled for former Alameda CEO, backlash on Flow's post-exploit rollback plan and Grubhub-linked holiday Bitcoin scam.
Breach Roundup: Clop Tied to Korean Air Vendor Breach
3 weeks 3 days ago
Also: China-Linked APT Hijack Updates, Condé Nast Data Leaked, La Poste Hit
This week, a Clop-linked vendor breach hit Korean Air, a China-linked APT hijacked software updates, a critical zero-day flaw remained unpatched, Condé Nast faced a data leak, La Poste was disrupted and Korean police extradited a malware operation suspect.
This week, a Clop-linked vendor breach hit Korean Air, a China-linked APT hijacked software updates, a critical zero-day flaw remained unpatched, Condé Nast faced a data leak, La Poste was disrupted and Korean police extradited a malware operation suspect.
Finnish Police Investigating New Undersea Cable Incident
3 weeks 4 days ago
Finnish Border Guard Seize Cargo Ship Suspected of Causing Disruption
Finnish police on Wednesday seized a cargo ship sailing from Russia suspected of rupturing an undersea telecommunication cable connecting Helsinki to Estonia, a region of the Baltic Sea that is the site of a slew of suspected Russian cable sabotage incidents.
Finnish police on Wednesday seized a cargo ship sailing from Russia suspected of rupturing an undersea telecommunication cable connecting Helsinki to Estonia, a region of the Baltic Sea that is the site of a slew of suspected Russian cable sabotage incidents.
What Kevin Bacon Can Teach You About Cybersecurity Careers
3 weeks 5 days ago
Systems Thinking, Not Tools, Increasingly Separates Senior Talent From Peers
The Six Degrees of Kevin Bacon game shows how quickly distance disappears once connections are traced. Cybersecurity careers work the same way. Advancement depends on understanding how your work connects to indirect risk, supply chain failures and business outcomes beyond your role.
The Six Degrees of Kevin Bacon game shows how quickly distance disappears once connections are traced. Cybersecurity careers work the same way. Advancement depends on understanding how your work connects to indirect risk, supply chain failures and business outcomes beyond your role.
More Banks Issue Breach Notifications Over Supplier Breach
3 weeks 5 days ago
Ransomware Attackers Grabbed Customer Data Stored by Marquis Software Solutions
More financial services firms are reporting breaches of customer data that trace to an August ransomware attack against Marquis Software Solutions, which provides marketing and compliance software used by over 700 banks and credit unions. At least 1.4 million consumer appear to be affected.
More financial services firms are reporting breaches of customer data that trace to an August ransomware attack against Marquis Software Solutions, which provides marketing and compliance software used by over 700 banks and credit unions. At least 1.4 million consumer appear to be affected.
Top 10 Cybersecurity Trends to Watch in 2026
3 weeks 5 days ago
Experts on Cyberattacks, Deepfakes, AI and Geopolitical Strife in the Year Ahead
Cyberattacks, nation-state hacking and geopolitical shifts dominated 2025, but the year will also be remembered as a turning point - where AI blurred the lines between real and fake and AI agents introduced new enterprise risks. Our panel of experts discusses the top 10 trends to watch in 2026.
Cyberattacks, nation-state hacking and geopolitical shifts dominated 2025, but the year will also be remembered as a turning point - where AI blurred the lines between real and fake and AI agents introduced new enterprise risks. Our panel of experts discusses the top 10 trends to watch in 2026.
Fraudsters Stick to What Works Even in the Age of AI
3 weeks 5 days ago
A Look Back at 3 Key Identity Fraud Trends in 2025
Fraudsters stick to the basics, because the basics work. Synthetic identities, fake accounts and tried-and-tested account takeovers still work, even in an age of artificial intelligence-related threats. Scammers are happy to keep on stealing the old-fashioned way.
Fraudsters stick to the basics, because the basics work. Synthetic identities, fake accounts and tried-and-tested account takeovers still work, even in an age of artificial intelligence-related threats. Scammers are happy to keep on stealing the old-fashioned way.
Red Team Brainstorming With GPTs Accelerates Threat Modeling
3 weeks 5 days ago
Large language models have a well-earned reputation for making things up. But for AI cybersecurity architect Erica Burgess, rather than being a bug, GPT hallucinations can be a threat-modeling feature. "I like to think of the hallucinations as just ideas that haven't been tested yet," she said.
Cracking the Code: AIOps Unleashed for Lightning-Fast MTTR
3 weeks 5 days ago
Cracking the Code: AIOps Unleashed for Lightning-Fast MTTR
3 weeks 5 days ago
Webinar | How Tool Sprawl Undermines Visibility and Response
3 weeks 5 days ago
2 Cyber Pros Admit to Being BlackCat Ransomware Affiliates
3 weeks 5 days ago
Americans Extorted at Least 5 Firms, Earning $1 Million From a Medical Device Maker
Two American cybersecurity professionals who moonlighted as BlackCat ransomware gang affiliates pleaded guilty to using the crypto-locking malware to extort at least five victims in the United States, including a medical device maker that paid a cryptocurrency ransom worth over $1 million.
Two American cybersecurity professionals who moonlighted as BlackCat ransomware gang affiliates pleaded guilty to using the crypto-locking malware to extort at least five victims in the United States, including a medical device maker that paid a cryptocurrency ransom worth over $1 million.
AI Jobs: What's Actually Sticking?
3 weeks 5 days ago
3 Years in, Generative AI Has Created Fewer New Roles Than Expected
Three years after ChatGPT's public debut in November 2022, the promised artificial intelligence job revolution has arrived. It's just not what anyone anticipated. Research shows that demand for AI fluency jumped nearly sevenfold in two years.
Three years after ChatGPT's public debut in November 2022, the promised artificial intelligence job revolution has arrived. It's just not what anyone anticipated. Research shows that demand for AI fluency jumped nearly sevenfold in two years.
Symantec, Carbon Black Unite Under Broadcom
3 weeks 6 days ago
Jason Rolleston: Unified Agent and AI Aim to Boost Midmarket Security Capabilities
Broadcom's integration of Symantec and Carbon Black promises a unified single-agent framework and AI-enhanced threat detection to help small and midmarket businesses defend against sophisticated cyberthreats with limited resources, said Jason Rolleston.
Broadcom's integration of Symantec and Carbon Black promises a unified single-agent framework and AI-enhanced threat detection to help small and midmarket businesses defend against sophisticated cyberthreats with limited resources, said Jason Rolleston.
75,000 MongoDBs Exposed as Attackers Exploit 'MongoBleed'
3 weeks 6 days ago
Patches Issued for MongoBleed as Ransomware Groups Target Flaw to Steal Data
Tens of thousands of internet-exposed MongoDB databases are at risk as attackers actively target a critical vulnerability in the software to steal sensitive data, with ransomware groups having joined the fray, researchers warn. MongoDB has issued patches and mitigation advice.
Tens of thousands of internet-exposed MongoDB databases are at risk as attackers actively target a critical vulnerability in the software to steal sensitive data, with ransomware groups having joined the fray, researchers warn. MongoDB has issued patches and mitigation advice.
Cybersecurity Trends: What's in Store for Defenders in 2026?
3 weeks 6 days ago
Attackers Continue to Hit Edge Devices and Wield Infostealers and Ransomware
As the year comes to a close, what's notable is how much doesn't seem to have fundamentally changed on the cyberattack front, across edge device targeting, breaches, ransomware and more. But the pace at which attacks unfold and defenders must respond, mitigate or triage seems to keep accelerating.
As the year comes to a close, what's notable is how much doesn't seem to have fundamentally changed on the cyberattack front, across edge device targeting, breaches, ransomware and more. But the pace at which attacks unfold and defenders must respond, mitigate or triage seems to keep accelerating.
Checked
5 hours 18 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed