Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

INETCO recognized in the Gartner Hype Cycle for Fraud and Financial Crime Prevention, 2025 Report

INETCO has been recognized as a Sample Vendor in the Gartner Hype Cycle for Fraud and Financial Crime Prevention, 2025. We hold the view that this recognition confirms what our customers already know: INETCO is redefining how financial institutions and payment service providers outsmart fraudsters, stay compliant and keep their customers safe.

The MemcycoFM Show: Ep 17 - Scam-Proofing Loyalty at Scale: What ATO Protection Should Look Like

Scam-Proofing Loyalty at Scale: What ATO Protection in Retail Should Look Like in 2025 Retail fraud has gone public. It no longer happens quietly in the background. Today’s scams are faster, sharper, and designed to look exactly like your brand. A spoofed checkout flow can harvest thousands of credentials before your SOC team even sees a spike. But the real damage isn’t always technical. In 2025, one impersonation scam can trigger waves of fake complaints, social media outrage, and reputational backlash that cost far more than the fraud itself.

Scam-Proofing Loyalty at Scale: What ATO Protection in Retail Should Look Like in 2025

Retail fraud has gone public. It no longer happens quietly in the background. Today’s scams are faster, sharper, and designed to look exactly like your brand. A spoofed checkout flow can harvest thousands of credentials before your SOC team even sees a spike. But the real damage isn’t always technical. In 2025, one impersonation scam can trigger waves of fake complaints, social media outrage, and reputational backlash that cost far more than the fraud itself.

Tales from the fraud frontlines: How to detect and defend against man-in-the-middle attacks

Picture this: Your payment network appears to be running smoothly, yet subtle inconsistencies in transaction data start to emerge. Authorizations are delayed or altered, and some backend calls never trigger. This isn’t just another case of stolen credentials or card fraud — it’s a devastating man-in-the-middle (MITM) attack that has been going on for months.

Malicious MCP Server on npm postmark-mcp Harvests Emails

On September 25, 2025, the npm package postmark-mcp, an MCP (Model Context Protocol) server intended to let AI assistants send emails via Postmark, was reportedly modified to secretly exfiltrate email contents by adding a blind-copy (BCC) to an external domain. Current analysis suggests the behavior began around 1.0.16 and persisted in later versions.

Breaking into Cybersecurity with Motti Tal: From Code to Cyber Strategies

In this episode of Breaking Into Cybersecurity's latest episode, featuring Motti Tal, CSO at Memcyco. Motti shares his journey from studying computer science at Tel Aviv University to programming for the Israeli Navy and eventually moving into software and cybersecurity. He discusses the evolution of his career, how AI influences critical thinking, and the importance of innovative thinking in cybersecurity.

FraudGPT and the Future of Cyber crime: Proactive Strategies for Protection

Generative artificial intelligence (GenAI) has firmly embedded itself in the workplace. As of 2024, more than two-thirds of organizations in every global region have adopted GenAI. And, as always, cyber criminals are eager to capitalize on a new and potentially powerful piece of technology. Over the past few years, a GenAI tool called FraudGPT has made phishing, hacking, and identity theft as simple as entering an AI prompt. FraudGPT and similar tools are essentially democratizing cyber crime.

Military ID Deepfakes: How North Korean Hackers Target the South with AI

North Korean threat actor Kimsuky has escalated its social engineering tactics by leveraging military ID deepfakes to deceive South Korean targets. According to a recent analysis by South Korean cybersecurity firm Genians, the group is now using AI-generated images to impersonate military personnel, making phishing campaigns more convincing and harder to detect.