Conference

Conference

23 01, 2019

WEST AFRICAN FINANCIAL INSTITUTIONS HIT BY CYBER ATTACKS

By | January 23rd, 2019|Conference|0 Comments

Symantec Threat Intelligence researchers have confirmed the suspicious attacks uncovered by Jighi as "real targeted attacks on banks and other financial institutions in several West Africa countries by cyber criminals " employing a range of commodity malware - readily available in cyber underground - and living off the land tools that allow them to hide [...]

19 11, 2018

FASTCash: How the Lazarus Group is Emptying Millions from ATMs

By | November 19th, 2018|Conference|0 Comments

Symantec uncovers tool used by Lazarus to carry out ATM attacks. On October 2, 2018, an alert was issued by US-CERT, the Department of Homeland Security, the Department of the Treasury, and the FBI. According to this new alert, Hidden Cobra (the U.S. government’s code name for Lazarus) has been conducting “FASTCash” attacks stealing money [...]

3 10, 2017

Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?

By | October 3rd, 2017|Conference|0 Comments

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]

6 09, 2017

Can Better IT Prevent the Spread of Ransomware?

By | September 6th, 2017|Conference|0 Comments

Is it possible that ransomware attacks are exacerbated in part by failures in corporate IT? Some of these failures are so grave they borderline “negligence”. It is just a matter of time before global organizations are liable for the disruption caused by outbreak of ransomware such as WannaCry and /NotPetya. These ramsonware use an exploit [...]

30 08, 2017

The Next Big Attack Landscape: Eye on SCADA

By | August 30th, 2017|Conference|0 Comments

This white paper explores the continuously expanding cyber-attack landscape through a profound analysis of the SCADA (Supervisory Control and Data Acquisition) Systems/ICS, their functionalities as well as the need to protect such systems from cyber-attacks to help safeguard the critical infrastructures.