Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

LTT Attack Targets Session Cookies to Push Crypto Scam

Crypto scams are skyrocketing: In 2022, the FBI tracked an 183% year-over-year increase, driving $2.57 billion in losses. Last week, the popular YouTube channel Linus Tech Tips (LTT for short) – and two associated channels – became the latest crypto scam victim and unsuspecting accomplice.

Bank Account Verification: The Benefits of Using Bank Account Verification APIs

When a consumer opens a bank account, the bank goes through a procedure called bank account verification. It enables all required checks to be made on the account user and the source of their income, successfully stopping illegal activities like money laundering and the financing of terrorism. In this post, we’ll examine how to validate a bank account and its owner, as well as the legal considerations that must be made while validating a client’s bank account.

SEBI's Regulations on E-Wallet KYC: What You Need to Know

Banks and fintech have been ordered by SEBI to ensure that investors complete transactions for mutual funds using e-wallets that comply with KYC requirements. The start date for this is May 1, 2023. The most recent SEBI circular suggested that all e-wallets fully comply with the RBI’s KYC requirements. In 2017, SEBI gave permission for fund firms to utilise e-wallets to collect up to Rs. 50,000 each fiscal year.

Just-In-Time Privilege Elevation: A least-privilege solution to protect your AD-connected business

One Identity Just-In-Time Privilege automatically assigns privileges at the time of a credential check-out – and immediately removes privileged access and resets the account password when task is completed. This protects your Active Directory from bad actors and potential breach.

The Ultimate Guide to SaaS User Onboarding

User onboarding, in particular for SaaS organisations, may raise the bar for your product. More sales may result straight from onboarding. So, encouraging new users to stay is essential. Additionally, the best way to build a community around your SaaS offering is through satisfied customers. These two factors are the precise reasons why the initial few client contacts must be successful.

Embracing Biometric Identity Verification: A Look at Belgium and Kuwait Telecoms

Belgium: The country’s telecom authority has given a telco in Belgium , which is the largest cable broadband service provider, permission to utilise facial biometrics for remote identity verification. According to the Belgian Institute for Postal Services and Telecommunications (BIPT), the telecom operator responded to an email with clarifications on how the implementation of biometrics fits within the nation’s electronic communications framework.

CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches

From the CISO perspective, identity security is one of the top security challenges, driven by the adversary’s increased use of stolen credentials to target and infiltrate organizations. The data bears this out: according to the CrowdStrike 2023 Global Threat Report, 80% of attacks use compromised identities, while advertisements for access broker services jumped 112% in 2022.