Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Preventing 'Unlimited' ATM Cash-out Attacks

On August 10th, the Federal Bureau of Investigation (FBI) issued a global fraud warning that an ‘unlimited’ ATM cash-out scheme was about to occur. While this did not stop criminals from making off with over $13.5 million USD from one bank in India, it did highlight the importance of early warning fraud systems and layered defense mechanisms.

How Trade Secrets Can Be Abused By An Attacker After A Data Breach

Even as public awareness of data breaches grows, the popular conception of what information is sensitive, and how sensitive it is, lags behind the threats that individuals, businesses, and governments face today. The classic model for a data breach is individuals’ login credentials for banking or private identity information like their social security numbers, but there is equal– and in many cases far greater– value in information with less obvious potential for abuse.

Resilience in the Age of Automated Hacking

When we think about cyber attacks, we usually think about the malicious actors behind the attacks, the people who profit or gain from exploiting digital vulnerabilities and trafficking sensitive data. In doing so, we can make the mistake of ascribing the same humanity to their methods, thinking of people sitting in front of laptops, typing code into a terminal window.