An Indian court convicted 11 people for their roles in the North Korean heist of $13.5 million in 2018 from Pune-based Cosmos Cooperative Bank. The United Nations attributed the thefts to North Korea, which uses criminal activity, including financially motivated hacking, to obtain hard currency.
Police in India have made seven arrests of suspected money mules involved in the theft of $13.5 million from Cosmos Bank. Authorities continue to investigate the heist in hopes of identifying those who led the attack.
Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. Security experts say the incident raises many questions.
So far, police have not found evidence that a major organized hacking group was responsible for the Cosmos Bank heist, which involved the theft of $13.5 million through ATMs and unauthorized SWIFT transactions. What steps should banks take to avoid becoming the next cyber heist victim?
The head-spinning rush to the cloud in the wake of the COVID-19 pandemic laid bare a new category of security risks that has forced both enterprises and cloud providers to adapt their security practices.
This report – a compilation of Black Hat research, Dark Reading reporting, and Omdia analysis – explores...
Every week, Information Security Media Group rounds up cybersecurity incidents and breaches around the world. In the days between April 21 and April 27, the spotlight was on the arrest of a Ukrainian trafficker in stolen data, a U.S. Navy shipbuilder and incidents in Canada, India and Kenya.
The boundaries between working "in the office," "on the road," or "at home" have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect
always-on availability. That business...
To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.
To assess if your organization is prepared to shut down ransomware attacks, we’ve assembled questions to help you evaluate your readiness level. Our interactive, downloadable self-assessment focuses on four key areas: vulnerability discovery, asset management, detection and response improvement, team cohesion.
Cybersecurity is an ongoing battle. Thankfully, there’s no shortage of effective solutions to help protect your organization but determining which best meet your needs can be overwhelming. When evaluating your next offensive security solution, this interactive checklist from Bishop Fox can help.
This...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.