Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tales from the fraud frontlines: Inside the rise of BIN attacks - and how to prevent them

Picture this: You’re in the middle of dinner with friends when your work phone buzzes. It’s the fraud supervisor with alarming news: Low-value transactions are suddenly flooding your servers. Your gut tightens as you hastily excuse yourself and head straight to the office to help secure your customers’ accounts against what turns out to be a Bank Identification Number (BIN) attack.

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down

A threat actor once again proved the importance of enforcing strict password management practices by torpedoing a 158-year-old UK transportation company by hacking a password and then effectively shutting it down with ransomware. According to published reports, the threat group Akira gained access to KNP's system in June when it was able to determine a single employee's password. Once access was gained, Akira injected ransomware, which shut down the network and encrypted access to its files and backups.

Top tips to build a human firewall

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we will explore ways on how to strengthen any company's first line of defense against cyberattacks. No matter how advanced your cybersecurity tools are, they’re only as strong as the people using them. Phishing scams, social engineering, and weak passwords are threats that often succeed not because systems fail but because humans do.

The Bullseye on Banks: Why Financial Services Remain a Prime Target for Cyberattacks

The frontlines of cybersecurity have long included the financial services sector, but today’s battlefield is increasingly asymmetric. Threat actors aren’t just going after the big-name banks with sprawling infrastructure and billion-dollar balance sheets. They’re targeting credit unions, wealth management firms, fintech startups, and insurance providers with the same determination and ferocity. What do these entities have that cybercriminals want? Plenty.

Advanced attacks: EDR alone is not sufficient

Your best defense against advanced attacks is your network. SOC teams need comprehensive network data to defend against attacks. Corelight combines industry-leading Zeek network metadata, multi-layered detections, packet capture (PCAP), and file analysis (YARA) for the best approach to network-driven defense. Disrupt attacks, address gaps within your security stack, and reduce risk to your organization with Corelight's NDR solution.

Top Financial Cyber Threats Facing Businesses in 2025

The world of business is facing a growing wave of cyber threats, especially when it comes to financial security. Cybercriminals are getting smarter, and their tactics are more sophisticated than ever. This isn't just a concern for big corporations; businesses of all sizes need to stay alert. A cyberattack could lead to major financial losses, damage to your reputation, or even legal headaches. In this article, we'll break down some of the top financial cyber threats businesses will likely face in 2025.

Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode

The Arctic Wolf Labs team has identified a new campaign by cyber-espionage group Dropping Elephant targeting Turkish defense contractors, specifically a manufacturer of precision-guided missile systems. The campaign employs a five-stage execution chain delivered via malicious LNK files disguised as conference invitations sent to targets interested in learning more about unmanned vehicle systems.

CrowdStrike Falcon Prevents Supply Chain Attack Involving Compromised NPM Packages

Recently, five popular NPM (Node Package Manager) packages were compromised and modified to deliver a malicious DLL, dubbed “Scavenger”. The malware pushed via these compromised NPM packages executes in two stages: an initial first-stage loader, followed by a second-stage infostealer. NPM is the package manager for the Node.js JavaScript platform, which allows developers to share and manage JavaScript libraries and tools.

What Is a DDoS Attack?

Companies face increasingly complex challenges every day, including cybersecurity threats aimed at disrupting their digital operations. One of the most frequent and damaging is the DDoS attack, which can take websites, applications, and critical services offline. Understanding what is a ddos attack is essential to identify risks, prevent attacks, and protect your organization’s digital infrastructure. In recent years, there have been attacks that marked a turning point in cybersecurity.