118 Results
Posted:

3-D Secure Optimization using Delegated Authentication

In this edition, we have Matt Cooke and James Jenkins discussing the 3-D Secure (3DS) optimization with a focus on Delegated Authentication, one of the key tools for minimizing friction during an eCommerce transaction while at the same time reducing fraud. Arcot is actively working with issuers and merchants on Arcot Delegated Authentication Framework to provide the contractual vehicle to support these transactions. This supports other tools such as Trusted Beneficiary, Data Only, and a wide range of available exemptions all designed to make 3DS work better. We also discuss the increasing problem of fraud attacks on Authorized Push Payments (APP) where fraudsters trick genuine cardholders to complete a fraudulent transaction. We explore how to leverage the Arcot Network to identify high-risk beneficiary accounts before funds are transferred thereby blocking fraud and protecting often some of the most vulnerable customers. Subscribe to our Monthly Newsletter to stay updated via email.

Download
Posted:

Bumblebee loader analysis, Raccoon Stealer returns, and LockBit launches a new version

In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman are joined by Symantec threat researcher Chris Kiefer to discuss our latest blog about the Bumblebee loader. We discuss this new malware’s place on the cyber crime landscape, its capabilities, and how it is being leveraged by ransomware actors. We also discuss the appearance of new versions of both Raccoon Stealer and LockBit, as well as an FBI warning about deepfakes being used in job interviews. The podcast will be taking a short break for the summer and we will be back with new episodes in September.

Download
Posted:

The Arcot Network, OOB Authentication Enhancements, EMVCo Protocol Updates

In this edition, we share updates including EMVCo and 2.3.1, the Arcot Network strategy, and continue our celebration of 25 years of Arcot. With PSD2 and the FCA mandate now fully in force, we continue our focus on optimization; leveraging the Arcot Authentication scorecard to drive higher CSR, ASR, and fight fraud. In addition, Arcot’s enhanced APIs and connectivity create opportunities for deeper integration, leveraging the Arcot Network to score transactions beyond 3DS. Hope you enjoy this edition!

Download
Posted:

BlackCat ransomware, Follina vuln used by Russian actors, and a new version of Metasploit

In this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss how Russian espionage actors are exploiting the Follina vulnerability, the release of the latest version of Metasploit, and a new phishing campaign that’s been underway on Facebook. We also discuss ransomware extensively, including what authorities were able to find when they took down the Netwalker ransomware gang, the increasing activity of the BlackCat ransomware, and some new research into the Hello XD ransomware. We also speculate about the impact turmoil on the cryptocurrency markets may have on the types of payment ransomware actors might demand.

Download
Posted:

The Follina Microsoft Office vulnerability, Conti break-up, and more ransomware activity

On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss the recently discovered Follina vulnerability in Microsoft Office, as well as some recent ransomware stories. One thing we talk about is the apparent break up of the Conti ransomware gang, with evidence pointing to the group folding itself into other ransomware gangs, including Hive, which carried out a recent attack on the health service in Costa Rica. The Clop and REvil names have also appeared in news reports in recent weeks, but are these ransomware gangs really back? And what are the signs of pre-ransomware activity that organizations need to look out for on their networks because they may indicate a ransomware attack in preparation?

Download
View More