Keeping your identity safe is increasingly difficult in today's digital world. Whether it's a mobile banking app, a SIM card, or an airline rewards program, ensure that personally identifiable information (PII) is safe from fraudsters. Read the latest articles on fraud protection, ranging from defending against identity theft and social media fraud to detecting and preventing malware attacks.
Latest Articles

Top Security Concerns When Accepting Crypto Payment

4 min read - From Microsoft to AT&T to Home Depot, more companies are accepting cryptocurrency as a way to pay for products and services. This makes perfect sense as crypto coins are a viable revenue source. Perhaps the time is ripe for businesses to learn how to receive, process and convert crypto payments into fiat currency. Still, many questions remain. How can you safely enable customers to pay with Bitcoin or other digital currency? What are the security risks that come with cryptocurrency? Let’s…

4 min read

NFT Security Risks: Old Scams and New Tricks

4 min read - The non-fungible token (NFT) boom has also led to some serious security incidents. For example, the number of suspicious-looking domain registrations with names of NFT stores increased nearly 300% in March 2021. To participate in an NFT marketplace, you must have an active cryptocurrency wallet. This exposes NFT holders to new risks as attackers can find ways into your crypto wallet through your marketplace account. As we’ll see, threat actors have even infiltrated NFT marketplace OpenSea’s Discord server posing as…

4 min read

2022 Banking & Finance Security Intelligence Roundup

3 min read - The banking and finance industries deliver more services online now than ever before due to the pandemic. As a result, banking cybersecurity became more important than ever this year. Some of the threats to big data security in recent years included ransomware attacks, the growth of contactless payments, mobile malware attacks and even data breaches of major banking and finance apps. Take a look at some of the major stories related to finance cybersecurity. How can IT executives and finance…

3 min read

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

6 min read - Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogramming, with a particular focus on its implementation in the Bazar family of malware (BazarBackdoor/BazarLoader). Bazar is best known for its ties to the cybercrime gang that develops and uses the TrickBot Trojan.…

6 min read
Failed to load data