Did you know that JPMorganChase, the largest U.S. bank, experiences a staggering 45 billion cyber events daily? This number highlights the significant cybersecurity challenge that banks and other financial institutions face.
With nearly one fifth of reported cyber incidents in the past two decades targeting finaicial institutions, one has to wonder what the impact is on the day to day business of banks like JPMorganChase.
Robbing a bank seems to have been appealing to criminals for as long as banks have existed. Who are the Jesse James and Butch Cassidy of today’s world? And how do you stop these modern bankrobbers from targeting your financial institution? In this Breaking the Bank episode of our Threat Talks podcast, our special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically “robs” banks to reveal security weaknesses.
P.S. Think you can spot the secret code in this episode? Join the treasure hunt, submit the code and win your very own Threat Talks t-shirt!
Bangladesh Bank SWIFT Attack
The Bangladesh Bank SWIFT Attack was an audacious heist involving infiltration of a bank’s network, manipulated SWIFT transactions and a dwell-time of over a year.
In this Deep Dive episode of Threat Talks, Lieuwe Jan Koning, Luca Cipriano and Rob Maas walk you through the intricacies of this heist, which resulted in $81 million stolen from the US Federal Reserve.
How did the attackers get in? And how did a spelling error prevent them from stealing the intended $951 million?
Vultur Android Malware
Have you ever installed the latest game on your phone and found your money mysteriously gone? Is this just a myth, or is there a frightening reality behind it?
In this Deep Dive episode, host Lieuwe Jan Koning is joined by Rob Maas (Field CTO ON2IT) and Luca Cipriano (Threat Intel Specialist ON2IT) as they explore the sophisticated banking Trojan designed to infiltrate your mobile devices: Vultur Android malware.
Rob Maas discusses the preventive measures that individuals and organizations can take to protect themselves, while Luca Cipriano delves into the technical aspects of the malware, explaining how attackers use droppers to bypass security and deploy malicious payloads.
Do you know what apps you’re installing to your phone? And what you’re giving them access to?
Follow our Threat Talks podcast
Stay up to date with the latest developments in the world of cybersecurity! Alongside industry experts, we explore recent cyber threats, what their impact was and how to prevent these threats in the future.