Banks are already privy to the threat of physical breaches, but many remain unaware of the ATM network security gaps that could enable fraudsters to access their systems.
A new cybergang operating a recent variant of the Ursnif Trojan has planted its flag in Australia, targeting banking customers with redirection attacks.
A new banking Trojan is using old PowerShell tricks to hide its activity from detection tools by continually launching malicious CHM files.
Cisco Talos discovered a new banking Trojan that exploits an authentic VMware binary to hide its malicious activities from security researchers.
A new, upgraded version of remote access malware Client Maximus points to the growing sophistication of cybercriminals in Brazil.
Effective ATM network protection requires a combination of basic and advanced approaches and a strong SIEM solution to monitor anomalous activity.
As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters' ROI.
IBM X-Force researchers discovered 20 apps in the Google Play Store that deliver mobile malware to unsuspecting Android users.
Banks and financial institutions require a dynamic strategy to identify emerging cybercrime trends and stop fraudsters in their tracks.
IBM Research — Haifa Labs detected yet another malware campaign, dubbed EmbusteBot, designed to target dozens of financial institutions in Brazil.