BankInfoSecurity.com
The AI Trust Gap: Governing Autonomous AI Without Losing Visibility or Control
1 week 1 day ago
AI Resilience: Preparing Infrastructure and Operations Teams for Autonomous AI
1 week 1 day ago
Securing Autonomous AI: New Security Strategies for AI Agents and Machine-Speed Risk
1 week 1 day ago
Go-Ahead for AI Chip Sales to 10 Chinese Firms Raise Alarms
1 week 1 day ago
Reports: Trump Administration Approval of Nvidia H200 Sales Poses Frontier AI Risks
Trump administration discussions on AI governance with China are colliding with reports that Washington may permit expanded Nvidia H200 chip sales to Chinese firms, fueling concerns that U.S. technology access could accelerate Beijing's frontier AI and military-linked ambitions.
Trump administration discussions on AI governance with China are colliding with reports that Washington may permit expanded Nvidia H200 chip sales to Chinese firms, fueling concerns that U.S. technology access could accelerate Beijing's frontier AI and military-linked ambitions.
Wave of ShinyHunters Extortion Drives Surge in Data Leaks
1 week 1 day ago
'Have I Been Pwned' Founder Troy Hunt Reviews Impact on People and Organizations
The volume of data breaches that result in stolen personal data being leaked online has been surging, "courtesy of the ShinyHunters," and while it affects individuals, the organizations being extorted are bearing the brunt of such attacks, said Troy Hunt, founder and CEO of Have I Been Pwned.
The volume of data breaches that result in stolen personal data being leaked online has been surging, "courtesy of the ShinyHunters," and while it affects individuals, the organizations being extorted are bearing the brunt of such attacks, said Troy Hunt, founder and CEO of Have I Been Pwned.
Microsoft Debuts Bug Hunting 100-Agent AI System
1 week 1 day ago
Computing Giant Touts Multi-Agentic 'MDASH' Approach as Superior to Single Models
Microsoft says its new approach to finding vulnerabilities with artificial intelligence agents outclasses the single models touted by Anthropic and OpenAI. MDASH is only being utilized internally by Microsoft engineers and tested by a "small set of customers as part of a limited private preview."
Microsoft says its new approach to finding vulnerabilities with artificial intelligence agents outclasses the single models touted by Anthropic and OpenAI. MDASH is only being utilized internally by Microsoft engineers and tested by a "small set of customers as part of a limited private preview."
ISMG Editors: Should We Trust Ransomware Gangs?
1 week 1 day ago
Ransomware Payouts, AI-Driven Threats and Reshaping Payment Fraud
In this week's panel, four ISMG editors discussed a ransomware case that once again raises questions about paying extortionists, why security leaders fear AI is accelerating attacks faster than humans can respond and how the rise of instant payments is reshaping fraud programs at banks.
In this week's panel, four ISMG editors discussed a ransomware case that once again raises questions about paying extortionists, why security leaders fear AI is accelerating attacks faster than humans can respond and how the rise of instant payments is reshaping fraud programs at banks.
Instructure Pays ShinyHunters Ransom to Little Likely Return
1 week 2 days ago
Hackers Constantly Break 'Confirmation of Data Destruction' Promises
When a business that stores children's personal data gets hit by data-leaking extortionists, what should it do? For Instructure, which develops online learning platform Canvas, the answer was to pay a ransom, and tell victims, straight-faced, to have "digital confirmation of data destruction."
When a business that stores children's personal data gets hit by data-leaking extortionists, what should it do? For Instructure, which develops online learning platform Canvas, the answer was to pay a ransom, and tell victims, straight-faced, to have "digital confirmation of data destruction."
The AI Trust Gap: How to Ensure Your Security Stack is Ready for Autonomous Agents
1 week 2 days ago
Webinar | Inside FortiSASE Sovereign: Architecting Private, Compliant SASE at Scale
1 week 2 days ago
Cisco CEO Robbins Ties AI Push to Unpatchable Tech Risk
1 week 2 days ago
Chuck Robbins Warns Customers Face Growing Exposure From Equipment Past Support
Cisco is embedding Anthropic's Claude Mythos Preview into internal security operations to test code, accelerate patching and push infrastructure upgrades, even as it lays off 4,000 employees to redirect spending toward AI, silicon, optics and security.
Cisco is embedding Anthropic's Claude Mythos Preview into internal security operations to test code, accelerate patching and push infrastructure upgrades, even as it lays off 4,000 employees to redirect spending toward AI, silicon, optics and security.
Cryptohack Roundup: Banking Trojan Targets Crypto Firms
1 week 2 days ago
Also: Indictments in Theft Case, KelpDAO Restarts Operations
This week, banking Trojan TCLBanker targeted crypto platforms, three people indicted in a violent digital assets-related robbery, Kelp DAO restarted services after the $292 million hack and the U.S. Department of the Treasury tightened oversight of Binance.
This week, banking Trojan TCLBanker targeted crypto platforms, three people indicted in a violent digital assets-related robbery, Kelp DAO restarted services after the $292 million hack and the U.S. Department of the Treasury tightened oversight of Binance.
Understanding the Hidden Cost of Faster Payments
1 week 2 days ago
As Regulators Tighten Liability Rules, Banks Face Pressure to Justify Fraud Losses
So far, banks have managed to strike a balance between fraud prevention and customer convenience, often accepting a certain level of loss rather than introducing controls that could slow payments, increase false declines or drive customers to competitors.
So far, banks have managed to strike a balance between fraud prevention and customer convenience, often accepting a certain level of loss rather than introducing controls that could slow payments, increase false declines or drive customers to competitors.
ECB: AI Means European Banks Must Hasten Cybersecurity Pace
1 week 2 days ago
France's Mistral Makes Digital Sovereignty Case for a European Mythos
The European Central Bank added to mounting warnings sent to financial institutions that they must urgently act to protect their systems from artificial intelligence-enabled cyberattacks. British experts warned that gains in AI models' cyber capabilities appear to be accelerating.
The European Central Bank added to mounting warnings sent to financial institutions that they must urgently act to protect their systems from artificial intelligence-enabled cyberattacks. British experts warned that gains in AI models' cyber capabilities appear to be accelerating.
Webinar | The New Attack Surface: Defending the Autonomous AI Ecosystem
1 week 3 days ago
Linux Defenders Face Patch and Exploit Race
1 week 3 days ago
Kernel Privilege Escalation Has One Linux Maintainer Contemplating a 'Kill Switch'
Back-to-back kernel vulnerabilities in Linux has defenders scrambling to apply defenses in the age of quick turnaround time for hackers to exploit nascent flaws. "Dirty Frag" and "Copy Fail" kernel privilege escalation vulnerabilities became public knowledge within two weeks of each other.
Back-to-back kernel vulnerabilities in Linux has defenders scrambling to apply defenses in the age of quick turnaround time for hackers to exploit nascent flaws. "Dirty Frag" and "Copy Fail" kernel privilege escalation vulnerabilities became public knowledge within two weeks of each other.
Claude Code Attack Persists After Token Rotation
1 week 3 days ago
Malicious npm Package Lets Attackers Capture Refreshed Tokens
A researcher has mapped a five-step attack on Claude Code that intercepts the credentials giving AI agents access to Jira, GitHub and Confluence, and demonstrated that the standard incident response move, rotating the stolen token, hands the attacker a fresh one.
A researcher has mapped a five-step attack on Claude Code that intercepts the credentials giving AI agents access to Jira, GitHub and Confluence, and demonstrated that the standard incident response move, rotating the stolen token, hands the attacker a fresh one.
Mass Supply-Chain Attack Slams npm and PyPi, Hits Mistral AI
1 week 3 days ago
Latest Mini Shai-Hulud Worm Steals Credentials, Includes Wiper, Now Open Source
A new Shai-Hulud variant has infected multiple npm repositories and jumped to other widely used JavaScript and Python packages. Designed to rapidly propagate, the worm steals over 100 different types of credentials and can wipe systems, including if developers try to delete it.
A new Shai-Hulud variant has infected multiple npm repositories and jumped to other widely used JavaScript and Python packages. Designed to rapidly propagate, the worm steals over 100 different types of credentials and can wipe systems, including if developers try to delete it.
CyberEd Board Talks | Top 5 SASE Predictions and Trends
1 week 3 days ago
A Live Panel Discussion with CyberEdBoard and Fortinet
Secure Access Service Edge is entering mainstream adoption. Enterprises are shifting from point solutions to platforms. And AI is now at the core of SASE.
Secure Access Service Edge is entering mainstream adoption. Enterprises are shifting from point solutions to platforms. And AI is now at the core of SASE.
Checked
33 minutes 21 seconds ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed