Remove AI Remove Email Compromise Remove Multifactor Authentication
article thumbnail

Uncovering The Lessons In A Third-Party Cyberattack

PYMNTS

In addition to employee training, organizations do have an opportunity to elevate their security technology investments, particularly when it comes to artificial intelligence (AI). Again, AI — and the information gathered from previous breaches — can be powerful protection tools. Blackbaud's data breach isn't unique, per se.

Breach 52
article thumbnail

Adversary-in-the-middle fraud: A growing concern for payments providers in 2025

The Payments Association

In an AiTM attack, the attacker typically sends a phishing email with a link that directs the victim to a fake login page (redirector or AiTM phishing page) designed to look like a legitimate service. These schemes typically involve: Phishing emails : Crafted to trick users into sharing login credentials.