Robert Dubuc hacked into various financial accounts and used them to divest money to other accounts and buy pre-paid debit cards.
Lamar Taylor was sentenced in New Jersey this past week for allegedly participating in a cybercrime scheme that accounted for more than $15 million.
The settlement brings some resolve to the 2012 breach, where the bank lost unencrypted backup tapes.
The Corporate Challenge site was one of many avenues tested by persistent attackers, reports reveal.
Fidelity claims, however, that no customer data appears to have been stolen.
MBIA says clients of its subsidiary, Cutwater Asset Management, were impacted.
The malware allowed criminals, with physical access to ATMs, to steal millions, Kaspersky revealed.
As the extent of the Chase breach surfaces, experts urge financial institutions to prepare for continued attacks or face impending consequences.
Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.
A Consumer Financial Protection Bureau campaign to curb deceptive banking activities has resulted in U.S. Bank being ordered to refund $48 million.
In an interesting twist, financial malware Citadel was used to infect firms outside of the finance sector via APT attacks, Trusteer found.
The suspect, Godswill Oyegwa Uyoyou, conspired with others to hack bank systems and divert 6.28 billion Naira to mule accounts.
This summer's attack on the bank's network might have helped hackers detect subtle vulnerabilities they could exploit in the future.
The "Cybersecurity: Protecting the Payments Systems" summit will encourage coordination between all cybersecurity and industry entities.
Android devices in Korea have primarily been impacted by the malware.
Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.
More than 12,000 messages have been sent to more than 400 companies as part of a phishing campaign targeting users of Bitcoin wallet Blockchain.info.
The National Bureau of Investigation (NBI) warned that the incident showcases the growing incidence of ATM skimming fraud.
The guidance is meant to help merchants and third parties better understand their roles and responsibilities in the payment security ecosystem.
Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.
Trusteer, an IBM company, said the new Citadel configuration was detected this month.
Symantec researchers found a new variant of the banking trojan.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
On Wednesday, Symantec released details on the malware's developed features.
Trusteer, an IBM company, revealed details on the bolware variants, which employ new tactics to manipulate web pages used for Boletos transactions.
Australia-based Bitcoins Reserve lost more than $62,000 after phishers began targeting bidders interested in the auction of 30,000 Bitcoins confiscated in the Silk Road takedown.
RSA has revealed the extent of bolware attacks in the country, which have remained a pervasive issue in the financial sector.
A point-of-sale and security systems vendor is notifying its customers, some of which are big restaurant chains, that its remote access service was breached.
The new Zeus variant employs AES-128 encryption as opposed to the older RC4 cipher used by other Zeus iterations.