Visualização normal

Antes de ontemStream principal
  • ✇ASEC BLOG
  • Ransom & Dark Web Issues Week 1, May 2026 ATCP
    ASEC Blog publishes Ransom & Dark Web Issues Week 1, May 2026         Guatemalan Government Agency Data Sold on DarkForums BlackWater Ransomware Attack Targets Chinese Auto Parts Manufacturer Japanese Fintech Firm Suffers Unauthorized GitHub Access
     

Ransom & Dark Web Issues Week 1, May 2026

Por:ATCP
6 de Maio de 2026, 12:00
ASEC Blog publishes Ransom & Dark Web Issues Week 1, May 2026         Guatemalan Government Agency Data Sold on DarkForums BlackWater Ransomware Attack Targets Chinese Auto Parts Manufacturer Japanese Fintech Firm Suffers Unauthorized GitHub Access

Canvas Breach May Put 275M Users, 9,000 Schools at Risk

4 de Maio de 2026, 09:38

Instructure confirms a Canvas breach involving user information and messages as hackers claim 275M users and nearly 9,000 schools were affected.

The post Canvas Breach May Put 275M Users, 9,000 Schools at Risk appeared first on TechRepublic.

Cyber-Secure Philanthropy: Tech Infrastructure for Global Donations

Secure philanthropy needs hardened payments, API security, and compliance controls to protect global donations from fraud and attacks.

Decoding Q1 2026’s $152.9 Billion Crypto Custody Concentration

Crypto Custody Concentration hits $152.9B as institutions shift to derivatives, consolidating capital on top exchanges amid Q1 market slowdown.

The Role of Aggregated Liquidity in Modern Crypto Markets

Aggregated liquidity improves crypto trading by combining multiple sources, offering better rates, deeper markets, and more reliable execution across assets.
  • ✇Malwarebytes
  • Big Tech can stop scams. They just don’t (Lock and Code S07E08)
    This week on the Lock and Code podcast… A dreadful thing happens far too often whenever an older adult falls for a scam: They get blamed for it. Not the scammers who lied and cheated their victim out of money. Not law enforcement for failing to recover funds. Not even the Big Tech companies that could have the most important role in protecting people online—and which, it turns out, knowingly bring in revenue every year from fraud. Instead, it is the older adults themselves whose stories a
     

Big Tech can stop scams. They just don’t (Lock and Code S07E08)

20 de Abril de 2026, 11:16

This week on the Lock and Code podcast…

A dreadful thing happens far too often whenever an older adult falls for a scam: They get blamed for it. Not the scammers who lied and cheated their victim out of money. Not law enforcement for failing to recover funds. Not even the Big Tech companies that could have the most important role in protecting people online—and which, it turns out, knowingly bring in revenue every year from fraud.

Instead, it is the older adults themselves whose stories are often shirked aside because of a mix of ageism and denial. Allegedly left behind by technology, only an octogenarian would hand their password over in a phishing scheme, or open an email attachment from a stranger, or send money to a fake charity online. Everyone else, everyone else believes, is too savvy for the same.

The data disagrees.

When Malwarebytes studied this last year, it found that, depending on the type of scam—especially for things like “sextortion”—younger individuals were far more likely to report falling victim. Further, digging into data from the US Federal Trade Commission revealed entirely separate patterns. For example, while Americans between the ages of 80 and 89 reported the highest median loss due to fraud in 2024, they also made up the smallest share of their population to report a loss at all. And in 2025, that same group represented the smallest share of reported identity theft, a crime far more likely to be reported by people between 30 and 39.

Questions about who reports what crimes at what rate are valid to explore, but it’s important to see the big picture: Americans lost at least $15.9 billion to fraud last year. Protecting older adults is actually about protecting everyone, and that’s because modern scams don’t arrive only where people over 70 spend time. They arrive where we all are, which is online. They come through endless text messages, they slide into social media DMs, and they prey on things any of us can be—a widow, a divorcee, or simply a lonely person.

According to Marti DeLiema, Assistant Professor at the University of Minnesota’s School of Social Work, scams and fraud are now the most common form of organized crime globally, rivaling weapons trafficking, drug trafficking, human trafficking, and sex trafficking. In 2024 alone, she said, the FTC estimated that older adults in the US had as much as $81.5 billion stolen from them. And the tools meant to fight back—broad consumer awareness campaigns, embedded warning messages at the point of transaction, the training of bank tellers and retail clerks—are nowhere near keeping pace.

So what actually works? And who, if anyone, is doing the work?

Today, on the Lock and Code podcast with host David Ruiz, we speak with DeLiema about who is really susceptible to financial fraud, why victims often describe a scam as a form of betrayal trauma, and why the companies best positioned to stop scam messages from reaching consumers may be the ones least motivated to do so.

“This is not a technical capability problem at all. This is a conflict of incentives.”

Tune in today to listen to the full conversation.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)


Listen up—Malwarebytes doesn’t just talk cybersecurity, we provide it.

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being with our exclusive offer for Malwarebytes Premium Security for Lock and Code listeners.

Founder Liquidity Without Compromising on Growth

Founders can access liquidity without exiting by selling shares via secondary deals, reducing financial pressure while staying focused on long-term growth.
  • ✇Security | CIO
  • Designing for complexity: Lessons from building a digital wallet integration
    Years ago, around 2015, while working on a digital wallet integration initiative at Lloyds Bank, I realized something fundamental: modern payment capabilities are not traditional software projects. Digital wallets such as Apple Pay changed how financial institutions design, deliver and govern technology. What appeared externally as a simple “tap-to-pay” feature required deep coordination across device manufacturers, payment networks, security standard bodies, regulators
     

Designing for complexity: Lessons from building a digital wallet integration

10 de Abril de 2026, 06:00

Years ago, around 2015, while working on a digital wallet integration initiative at Lloyds Bank, I realized something fundamental: modern payment capabilities are not traditional software projects.

Digital wallets such as Apple Pay changed how financial institutions design, deliver and govern technology. What appeared externally as a simple “tap-to-pay” feature required deep coordination across device manufacturers, payment networks, security standard bodies, regulators and banking platforms.

Today, as organizations integrate AI platforms, embedded finance and partner ecosystems, the same complexity patterns are repeating.

This article shares the practical lessons for designing and delivering complex requirement ecosystems, using digital wallet integration as a reference model.

Why this was not a normal requirement

Traditional banking delivery assumes:

  • Clear ownership of systems
  • Stable requirements
  • Internal control over timeline
  • Predictable testing environment

Digital wallets broke all four assumptions. Instead, delivery depended on:

  • Security-first architecture constraint
  • Payment network standards
  • Continuous Requirement evolution
  • External platform certification

By 2025-2026, digital wallets facilitated tens of trillions in global transaction value annually (e.g., estimates place combined digital wallet volumes at $10-40+ trillions in recent years), with user bases exceeding 4-5 billion globally and hundreds and millions for a leading platform like Apple Pay.

For Apple Pay specifically, recent estimates show approximately 800 million+ users and approximately $9-9.5 trillion in transaction volume in 2025, making it the second-largest payment processor behind Visa.

The lesson I learned: When a requirement depends on an external platform, you are no longer building a product; you are joining an ecosystem.

Start with ecosystem architecture, not solution architecture

One of the most common mistakes organizations make is jumping directly into solution design.

Complex integration design requires mapping the ecosystem first.

Key questions leaders must answer early:

  • Who owns customer identity?
  • Where in the architecture and who controls security division?
  • What components require external certifications?
  • Which dependencies are outside delivery control?

In a payment ecosystem, multiple parties collaborate to enable a single transaction.

  • Device platform provider
  • Issuing bank
  • Card networks
  • Token service providers
  • Merchant and acquirers

Requirement documents may quickly become outdated if the ecosystem mapping is not properly mapped.

Requirements must become adaptive, not static

The platform rules evolved continuously. Security standards updated. Certification expectations changed. Integration Interfaces matured.

Successful teams shifted from documentation-heavy approaches toward:

  • Capability-based requirement
  • Incremental approval checkpoints
  • Continuous partner validation
  • Outcome-focused design

Instead of asking: “What are the final requirements?” The team focused on “What capabilities must remain stable even if implementation changes?”

Security is the architecture, not a phase

Digital wallets introduced a major architectural shift; payment systems stopped transmitting the real card numbers

Instead, they rely on payment tokenization standard developed by EMVCo, where a unique token replaces the actual card number during transactions. This replaces the sensitive Primary Account Number (PAN) with a device- or domain- specific token, rendering stolen data far less usable to fraudsters.

You can explore how tokenization works here: EMV Payment Tokenization Overview.

This approach dramatically reduces fraud risk because stolen tokens cannot be reused outside their intended context.

For engineering leaders, this creates a critical realization that Security constraints drive architecture decisions long before functional design begins.

Security became the foundation of the design.

Operating models must evolve

Complex integrations expose organizational bottlenecks quickly.

Traditional silos, business, security, engineering and compliance slow delivery when decisions must happen rapidly.

Successful delivery required:

  • Embedded risk and compliance participation
  • Architects involved from ideation
  • Faster decision-making authority

The hidden leadership lesson: Orchestration over ownership

Digital wallet integration previewed the future of enterprise technology.

Organizations no longer control the entire system.

Instead, success depends on orchestrating capabilities across independent platforms.

This shift is visible today in:

  • Embedded finance ecosystem
  • Open banking APIs
  • AI Platform Integrations
  • Cloud-native partner marketplaces

Leaders must evolve from system owners to ecosystem orchestrators.

A practical framework for designing complex requirements

Based on real delivery experience, leaders can apply this framework:

  • Identify ecosystem complexity early. If success depends on external platforms, treat it as an ecosystem program.
  • Design governance before architecture. Alignment mechanism reduces delay more than technical optimization.
  • Make security a design driver. Security models shape system boundaries.
  • Define capabilities, not fixed requirements. Assume change is inevitable.
  • Align operating model to dependency speed. Decision latency becomes the biggest delivery risk.
  • Build integration maturity as a core capability. Future competitiveness depends on how well organizations integrate, not just build.

A new delivery paradigm

What looked like a payment feature was actually a preview of modern digital transformation.

The real innovation was not contactless payments; it was a new delivery paradigm where value emerges from a coordinated ecosystem rather than standalone systems.

Today’s most complex initiatives, like AI adoption, platform integration and digital partnerships, follow the same pattern.

Organizations that learn to design for ecosystem complexity will deliver faster, safer and with far greater resilience. Will your organization treat the next big iteration as a feature or as an ecosystem transformation?

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything

7 de Abril de 2026, 15:49
The AI lab's Project Glasswing will bring together Apple, Google, and more than 45 other organizations. They'll use the new Claude Mythos Preview model to test advancing AI cybersecurity capabilities.

❌
❌