BankInfoSecurity.com
Moving From Anomalies to Connections in Fraud Defense
1 month 2 weeks ago
Shared Network Intelligence Adds Ecosystem Visibility to AI Models
Fraudsters collaborate, but most banks still detect fraud alone. This imbalance has defined fraud prevention for years. Now CISOs and fraud practitioners are rethinking their approach using network intelligence signals. Network intelligence shifts the lens by focusing on relationships across banks.
Fraudsters collaborate, but most banks still detect fraud alone. This imbalance has defined fraud prevention for years. Now CISOs and fraud practitioners are rethinking their approach using network intelligence signals. Network intelligence shifts the lens by focusing on relationships across banks.
White House Rolls Out Global AI Initiatives
1 month 2 weeks ago
New Programs Aim to Counter Foreign Influence Over Tech Standards
The White House is operationalizing its AI action plan with export-ready "American AI stack" packages, a U.S. Tech Corps and new standards initiatives, aiming to entrench U.S. infrastructure in allied nations while countering foreign influence over global AI governance.
The White House is operationalizing its AI action plan with export-ready "American AI stack" packages, a U.S. Tech Corps and new standards initiatives, aiming to entrench U.S. infrastructure in allied nations while countering foreign influence over global AI governance.
The Danger of IT, OT, Medical Device Cyber Turf Wars
1 month 2 weeks ago
What often appears to be turf wars between healthcare technology management, facilities OT staff, IT departments and security teams are often the result of unclear ownership and accountability for device security. And that presents safety risks to patients, says Mohammed Waqas, CTO of Armis.
OnDemand | Why AI Era Attacks Need a Programmatic Approach to CPS Security
1 month 2 weeks ago
Multi-Jurisdiction Cyber Defense: Threat Intelligence Across City–County–State
1 month 2 weeks ago
Open-Weight AI Models Fail the Jailbreak Test
1 month 2 weeks ago
Cisco: One Prompt May Not Break Most AI Models, But a Conversation Will
Cisco tested eight major open-weight artificial intelligence models and found multi-turn jailbreak attacks succeeded nearly 93% of the time, exposing a blind spot in how enterprises assess and deploy large language models safety.
Cisco tested eight major open-weight artificial intelligence models and found multi-turn jailbreak attacks succeeded nearly 93% of the time, exposing a blind spot in how enterprises assess and deploy large language models safety.
PayPal Ties Small Data Breach and Fraud to App Coding Error
1 month 2 weeks ago
Fintech Giant Says Personal Data Exposed for About 100 Business Users of Loan App
Financial services firm PayPal said it discovered a data breach that lasted for six months, exposed some business customers' personal information and led to fraudulent charges. The company said about 100 customers were affected, and that it has fully refunded them for fraudulent charges.
Financial services firm PayPal said it discovered a data breach that lasted for six months, exposed some business customers' personal information and led to fraudulent charges. The company said about 100 customers were affected, and that it has fully refunded them for fraudulent charges.
Anthropic's AI Bug Hunter Jolts Cyber Stocks
1 month 2 weeks ago
AI Code Scanner Rattles a $200B Industry
Anthropic launched Claude Code Security, an AI tool that found 500+ undetected bugs in production code. Cybersecurity stocks dropped sharply, but analysts are split on whether the disruption signals a genuine industry reckoning or a market overreaction.
Anthropic launched Claude Code Security, an AI tool that found 500+ undetected bugs in production code. Cybersecurity stocks dropped sharply, but analysts are split on whether the disruption signals a genuine industry reckoning or a market overreaction.
ISMG Editors: No Honor Among Ransomware Thieves
1 month 2 weeks ago
Also: AI, Machine Identity Risks; Europe’s Digital Sovereignty Push
In this week's panel, four ISMG editors examined how cybercriminals may be turning on each other, what security leaders are really saying about machine identities and AI risk, and how shifting U.S.-Europe dynamics are reshaping technology resilience and digital sovereignty.
In this week's panel, four ISMG editors examined how cybercriminals may be turning on each other, what security leaders are really saying about machine identities and AI risk, and how shifting U.S.-Europe dynamics are reshaping technology resilience and digital sovereignty.
How to Spot a North Korean Job Candidate
1 month 2 weeks ago
Prompt Candidates to Wave, Check IP Addresses and Ask About Their Supposed Location
They're young, tech-savvy and often the most productive remote worker on the team. They're a major security risk numbering in the thousands that a multitude of Fortune 500 companies have unwittingly ushered into their network. They are North Korean IT workers.
They're young, tech-savvy and often the most productive remote worker on the team. They're a major security risk numbering in the thousands that a multitude of Fortune 500 companies have unwittingly ushered into their network. They are North Korean IT workers.
Hospitals at Risk of BeyondTrust Ransomware Hacks
1 month 2 weeks ago
Critical Vulnerability Could Give Attackers Foothold in Clinical Networks
Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a hospital or clinic network.
Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a hospital or clinic network.
Android Malware Taps Google Gemini at Runtime
1 month 2 weeks ago
Researchers Say PromptSpy Automates Persistence on Infected Devices
A newly discovered Android malware strain, "PromptSpy," is using Google's Gemini generative artificial intelligence model to automate part of its persistence mechanism, marking what researchers describe as the second known case of AI-driven mobile malware.
A newly discovered Android malware strain, "PromptSpy," is using Google's Gemini generative artificial intelligence model to automate part of its persistence mechanism, marking what researchers describe as the second known case of AI-driven mobile malware.
Why Banks Need AI-Driven Segmentation Against Ransomware
1 month 2 weeks ago
AI-powered ransomware compresses attacks from weeks to minutes. Michael Villar, director of field security technology at Akamai, says banks need AI-driven segmentation to contain intruders fast, limit lateral movement and protect sensitive data before extortion begins.
Webinar | Explainable AI for SEC-Ready Security
1 month 2 weeks ago
Webinar | AI for Faster, Defensible Incident Response
1 month 2 weeks ago
Certificate Automation: From Nice-to-Have to Mission-Critical
1 month 2 weeks ago
Breach Roundup: Cambodia Scam Center Crackdown
1 month 2 weeks ago
Also: EU Bans AI Tools, Notepad++ Secures Updater, Apple Patches iOS Zero-Day
This week, Cambodia shuttered 200 scam centers. EU Parliament banned AI tools. Canada Goose disputed a ShinyHunters leak. Notepad++ patched an updater flaw. Apple fixed a decades-old iOS zero-day. BeyondTrust and Dell patched critical flaws under active exploitation.
This week, Cambodia shuttered 200 scam centers. EU Parliament banned AI tools. Canada Goose disputed a ShinyHunters leak. Notepad++ patched an updater flaw. Apple fixed a decades-old iOS zero-day. BeyondTrust and Dell patched critical flaws under active exploitation.
Treasury AI Plan Faces Calls for Enforceable Controls
1 month 2 weeks ago
Analysts Urge Mandatory Guardrails on AI Agents, Identity and Privilege
Security leaders are pressing Treasury to embed enforceable guardrails - covering adversarial testing, AI inventory, identity privilege mapping and real-time monitoring - into its forthcoming financial-sector AI guidance as deepfake fraud, data poisoning and autonomous agent risks escalate.
Security leaders are pressing Treasury to embed enforceable guardrails - covering adversarial testing, AI inventory, identity privilege mapping and real-time monitoring - into its forthcoming financial-sector AI guidance as deepfake fraud, data poisoning and autonomous agent risks escalate.
Univ. of Mississippi Medical Center Dealing With Cyberattack
1 month 2 weeks ago
Hospital, ER Open but All Clinics, Elective Care Cancelled Statewide; FBI Called In
The University of Mississippi Medical Center on Thursday said a ransomware attack has triggered its emergency operations plan and forced its hospitals to cancel all clinic and elective procedures at all locations statewide.
The University of Mississippi Medical Center on Thursday said a ransomware attack has triggered its emergency operations plan and forced its hospitals to cancel all clinic and elective procedures at all locations statewide.
Checked
7 hours 41 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed