Data Breaches

Banks Rethink Cybersecurity Amid Rise of Credential-Based Compromise
Banks Rethink Cybersecurity Amid Rise of Credential-Based Compromise
April 22, 2025  |  Cybersecurity

The image of a hacker furiously typing strings of code to brute-force their way into a corporate server is becoming outdated. Today, the most dangerous...

READ MORE >
23andMe’s Data Security Catches Attention of House GOP
23andMe’s Data Security Catches Attention of House GOP
April 17, 2025  |  Security & Fraud

A trio of lawmakers want answers from 23andMe about the security of its customer data. In a letter to the bankrupt genetic testing service Thursday...

READ MORE >
Capital One Launches Data Security Solution Databolt
Capital One Launches Data Security Solution Databolt
April 17, 2025  |  Security & Fraud

Capital One Software introduced a tokenization solution to help businesses address data security challenges. Capital One Databolt is designed to let companies protect sensitive data...

READ MORE >
US Agencies Warn of ‘Fast Flux’ Attacks Derailing Enterprise Networks
US Agencies Warn of ‘Fast Flux’ Attacks Derailing Enterprise Networks
April 07, 2025  |  Cybersecurity

Now more than ever, cybersecurity is defined by an ongoing arms race. As enterprises and organizations seek to secure their perimeters with sophisticated technological walls,...

READ MORE >
Oracle Cyberattack Highlights Importance of Securing Enterprise Cloud Environments
Oracle Cyberattack Highlights Importance of Securing Enterprise Cloud Environments
April 03, 2025  |  Cybersecurity

Enterprise cores and business-line technology stacks have increasingly moved to the cloud. But as enterprises expand their digital footprints, the data they generate, store and...

READ MORE >
Rise of Industrialized Fraud Heats Up Cyber Arms Race
Rise of Industrialized Fraud Heats Up Cyber Arms Race
March 12, 2025  |  Security & Fraud

Fraud is an adversarial game, and today’s fraudsters are exhibiting a level of organization that mirrors legitimate businesses. They follow schedules, deploy sophisticated technology, and...

READ MORE >
55% of COOs Use GenAI to Improve Data Security
55% of COOs Use GenAI to Improve Data Security
March 07, 2025  |  artificial intelligence

As cyber threats become more sophisticated, chief operating officers (COOs) are turning to generative AI (GenAI) to enhance data security. According to a PYMNTS Intelligence...

READ MORE >
Ransomware Group Black Basta’s Internal Communications Leaked Online
Ransomware Group Black Basta’s Internal Communications Leaked Online
February 23, 2025  |  Cybersecurity

More than 200,000 messages from high-profile ransomware group Black Basta have leaked online. The leak of more than a year of communications, as Ars Technica...

READ MORE >
Why CFOs and CISOs Should Care About B2B Cyber Audits
Why CFOs and CISOs Should Care About B2B Cyber Audits
February 11, 2025  |  Cybersecurity

Today’s digital landscape is breaking down traditional silos — especially those around core business risks. Cybersecurity, which was at one point viewed primarily as an...

READ MORE >