Cybersecurity

Cybersecurity
Banks Rethink Cybersecurity Amid Rise of Credential-Based Compromise
April 22, 2025

The image of a hacker furiously typing strings of code to brute-force their way into a corporate server is becoming outdated. Today, the most dangerous cyber intrusions can come not from forced entries, but from front doors to organizational perimeters being quietly opened with valid...

Cybersecurity
UN Warns Southeast Asian Cybercriminals Are Going Global
April 21, 2025

Cybercrime syndicates based in Southeast Asia are expanding their operations on an industrial scale, according to the United Nations. The U.N. Office on Drugs and Crime (UNODC) said in a Monday (April 21) report that the threat from criminal networks in countries such as Myanmar,...

Cybersecurity
OCC Notifies Congress of ‘Major Security Incident’ Involving Email Access
April 08, 2025

The Office of the Comptroller of the Currency (OCC) said Tuesday (April 8) that it notified Congress of a “major security incident” in which there was unauthorized access to OCC emails and email attachments. The agency discovered some unusual activity on Feb. 11, activated its...

Cybersecurity
US Agencies Warn of ‘Fast Flux’ Attacks Derailing Enterprise Networks
April 07, 2025

Now more than ever, cybersecurity is defined by an ongoing arms race. As enterprises and organizations seek to secure their perimeters with sophisticated technological walls, leveraging artificial intelligence (AI), machine learning and other tactics. threat actors and cybercriminals are working to build taller and taller...

Cybersecurity
CFOs Embrace Zero Trust Architectures as Back Offices Go Headless and Distributed
April 04, 2025

The concept of the organizational perimeter is a constantly evolving one. Today’s enterprise security perimeter is, and must be, everywhere, as back offices are more and more moving to the forefront of an effective cybersecurity posture. Decades ago, corporate tech stacks were primarily defined by physical...

Cybersecurity
Oracle Cyberattack Highlights Importance of Securing Enterprise Cloud Environments
April 03, 2025

Enterprise cores and business-line technology stacks have increasingly moved to the cloud. But as enterprises expand their digital footprints, the data they generate, store and transfer becomes increasingly vulnerable to interception, manipulation or outright theft. The threat environment today has progressed to the point where...

Cybersecurity
Report: Oracle Staff Tell Some Clients Hacker Stole Login Credentials
April 02, 2025

Oracle staff reportedly told some clients that a hacker stole some old client login credentials. The hacker accessed usernames, passkeys and encrypted passwords, Bloomberg reported Wednesday (April 2), citing unnamed sources. Oracle did not immediately reply to PYMNTS’ request for comment. This incident is separate...

Cybersecurity
Future of Bank Security Is Being Written by Ethical Hackers
March 26, 2025

Historically, banks built security the same way they built vaults: thick walls, high fences and minimal exposure. But digital transformation has upended that perimeter. Open banking APIs, third-party FinTech integrations, cloud-native architectures and rapid app deployments have created an attack surface far too broad for...

Cybersecurity
Cybersecurity Agency Faces Scrutiny Amid Spending Cuts, Personnel Shifts
March 25, 2025

A part of the U.S. Department of Homeland Security (DHS) responsible for identifying and monitoring cyberattacks has come under scrutiny as the Department of Government Efficiency (DOGE) looks to make spending cuts across the board. The Cybersecurity and Infrastructure Security Agency (CISA) — part of...