Risk

10/12/2016
10:00 AM
50%
50%

G7 Nations Plan To Team Up To Tackle Financial Cybercrime

Group of Seven nations' new guidelines include sharing updates by governments, private firms and regulators, plus joint address of shortfalls.

Worries about growing risks from cybercriminals to the interconnected global financial systems has led the Group of Seven (G7) industrial nations to release guidelines directing members how to monitor their cybersecurity practices from a risk management viewpoint, reports Reuters. These principles, reportedly non-binding, are formulated by G7 finance ministers and central banks.

The guidelines were prepared after a study of existing cybersecurity practices and are aimed at identifying weak points in global applications, says Reuters. Governments and financial companies are told to share updates on joint threats and fight breaches from a common platform. These instructions, seen as a necessity after the US Federal Reserve reported more than 50 breaches between 2011 and 2015, also extend to firms and regulators across the world.

"Maintaining trust and confidence in the financial sector significantly improves when entities and public authorities have the ability to mutually assist each other," the guidelines say.

Read the full report at Reuters.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.
CVE-2018-12688
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has a segmentation fault in the wav2Decode function.
CVE-2018-10002
PUBLISHED: 2018-06-22
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.