Tag: Threat Intelligence

  • Jackpotting, Black Boxes, and State-Sponsored Hackers

    Jackpotting, Black Boxes, and State-Sponsored Hackers
    ,

    This is Part 3 of a 4-part series on ATM attack risks and defense strategies. In Part 1, we examined the evolving threat landscape. In Part 2, we covered the physical attack vectors. Now we turn to the logical and cybersecurity attacks that represent the most dangerous and rapidly evolving threats to ATM networks. While Read more

  • The Evolving ATM Threat Landscape

    The Evolving ATM Threat Landscape
    ,

    This is Part 1 of a 4-part series on ATM attack risks and defense strategies. Based on original research compiled in our comprehensive white paper, this series explores the evolving threat landscape targeting Automated Teller Machines—from physical attacks and card skimming to sophisticated cyber intrusions and state-sponsored heists. Automated Teller Machines remain a cornerstone of Read more

  • Anatomy of a Cyber-Physical Heist

    Anatomy of a Cyber-Physical Heist
    ,

    UNC2891 Cyber-Physical Attack: An Interactive Analysis Attack Analysis Overview Attack Flow Threat Actor Defense Anatomy of a Cyber-Physical Heist An interactive deep dive into the sophisticated, multi-stage attack by the threat actor UNC2891, who blended physical intrusion with advanced digital warfare to target a major financial institution. The Attack Flow: From Physical Breach to Digital Read more

  • ATM Security Framework

    ATM Security Framework
    ,

    The modern ATM is not just a cash dispenser; it is a complex, high-risk endpoint running a full-fledged OS like Windows. This reframes the ATM as a specialized PC, requiring a holistic security approach that merges enterprise endpoint security with controls for its unique physical and transactional functions. Read more