ReportWire

Tag: Email

  • Three Fresh Lending Tools that Are Redefining Credit Decisioning – Finovate

    [ad_1]

    As banks digitize their lending processes and seek to expand credit access across borders, it is becoming increasingly difficult to make fast, accurate credit decisions. To mitigate risk, lenders need real-time insights into spending habits, automated functionality, and visibility into a broader set of data, especially as they seek to improve speed, enhance the customer experience, and maintain compliance.

    At FinovateEurope 2026, a new group of fintechs will showcase how they are addressing these challenges by bringing intelligence and automation directly into the lending process. From sourcing alternative credit data to deploying AI-driven lending agents, the companies below are helping banks and lenders modernize credit decisioning while keeping risk in check.

    FinovateEurope 2026 will take place at London’s InterContinental O2 on February 10 and 11. Tickets are available now. Visit our FinovateEurope hub today and save your spot!


    Intuitech

    Intuitech brings live AI agents into lending workflows to automate manual, time-consuming processes across origination and servicing. The company helps lenders streamline tasks including data collection, validation, and borrower interactions. This automation helps reduce operational burden while improving speed and consistency.

    By embedding AI agents directly into clients’ lending operations, Intuitech enables them to scale their lending activity without requiring additional talent in-house. The automated approach helps bring modern credit delivery to lenders of all sizes.

    Mifundo

    Mifundo’s technology enables customers to assess cross-border credit risk by sourcing and standardizing credit data from across European markets. The company helps lenders better evaluate borrowers with international financial histories by assess creditworthiness for mobile, expatriate, and cross-border customers. Mifundo enables banks to reach more borrowers, as many are underserved by traditional credit systems and therefore are overlooked.

    With remote work becoming more popular and the potential for cross-border lending increasing, firms are realizing that there is a gap in data for European credit markets. Mifundo closes this gap by expanding access to reliable credit information, ultimately helping lenders minimize risk while unlocking new lending opportunities across borders.

    Sea.dev

    sea.dev provides real-time risk insights designed to help lending teams make better credit decisions across the loan lifecycle. The company’s platform aggregates and analyzes borrower, portfolio, and market-level data to offer lenders clearer visibility into risk exposure, ultimately supporting faster approvals.

    sea.dev enables lending teams to continuously monitor risk and adapt decisions as inputs change. The company’s more dynamic, insight-driven approach helps lenders explore more products and serve new borrower segments.

    Why banks should care

    With more consumer data available than ever before, lenders can now underwrite loans more effectively, especially for customers who were once considered risky or had limited credit histories. This abundance of data also introduces new challenges, including inaccurate, unclean, or cross-border information that can complicate analysis and require specialized expertise. Fortunately, new tools are emerging to help automate data collection, filtering, and validation. These tools have the potential to enable lenders of all sizes to expand their reach and better serve a broader customer base.


    Photo by RDNE Stock project

    Views: 65

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • Sumsub Partners with Fireblocks to Ensure Travel Rule Compliance – Finovate

    [ad_1]

    Compliance and fraud prevention platform Sumsub has teamed up with digital asset infrastructure solutions provider Fireblocks to provide Travel Rule compliance.

    The Travel Rule is a regulation mandated by the Financial Action Task Force (FATF) designed to fight money laundering and terrorist financing. The rule requires financial institutions and Virtual Asset Service Providers (VASPs) to share specific information about the sender and receiver of funds during certain transactions. Enacted to defend traditional financial transactions from money laundering and terrorist financing, the rule has been extended to cover cryptocurrencies and digital assets.

    Courtesy of the partnership, Sumsub’s Travel Rule solution will be natively integrated into the Fireblocks platform. This will provide both financial institutions and VASPs with real-time, automated, and dynamic verification for virtual asset transactions. Fireblocks users will benefit from complete control over compliance workflows, enabling them to customize these workflows to fit their preferred risk profiles. The integration features automated and encrypted Travel Rule data exchange between VASPs, supporting faster and more secure stablecoin payments.

    “We’re excited to partner with Fireblocks to bring native Travel Rule compliance directly into one of the world’s leading digital asset infrastructure platforms,” the company noted on its X page. “Together we’re setting a new standard for Travel Rule compliance—secure, automated, and designed for scale—helping businesses power faster, safer, and fully compliant stablecoin payments.”

    The Sumsub/Fireblocks partnership comes at a time of increased interest in stablecoins, with stablecoin volumes nearing $1 trillion per month in 2025, twice the levels of the previous year. The rise of stablecoins has put pressure on the fragmented settlement rails and compliance workflows of VASPs and other financial institutions. Further, evolving regulations—from MiCA in the European Union to the latest moves from the FATF—are driving firms to improve their ability to manage financial risks associated with virtual assets, including both implementation and operationalization of the Travel Rule.

    “As digital asset payments and stablecoin adoption accelerate, our customers need compliance solutions that are robust and operationally seamless,” Fireblocks SVP of Corporate Development & Partnerships Adam Levine said. “By integrating Sumsub’s Travel Rule solution directly into the Fireblocks platform, we’re giving institutions the flexibility to meet global regulatory requirements while maintaining efficient, streamlined transaction workflows.”

    Per the partnership, Fireblocks will remain the hub for transaction processing. Sumsub will provide secure, real-time Travel Rule data exchange to enrich the transaction workflow, facilitating access to 1,800+ VASPs across top protocols including GTR, CODE, Sygna, the Sumsub protocol, and more. The data sharing between counterparties in virtual asset transfers is fully embedded in the Fireblocks platform to ensure scalable, friction-free compliance.

    New York-based Fireblocks is a digital asset infrastructure company that helps organizations build, manage, and scale their businesses on the blockchain. The company streamlines stablecoin payments, settlement, custody, tokenization, and trading operations across a large ecosystem of banks, payment providers, stablecoin issuers, exchanges, and custodians. Fireblocks counts 2,200 organizations among its customers including Finovate alums like Worldpay and Revolut. The company secures more than $10 trillion in digital asset transactions across 100 blockchains.

    Founded in 2015 and headquartered in London, Sumsub (“Sum & Substance”) made its Finovate debut at FinovateEurope 2020 in Berlin, Germany. At the conference, the company demonstrated its all-in-one technical and legal solution to help firms meet KYC/KYB/AML requirements. The company’s technology helps accelerate verification, reduce costs, and detect fraud, and is used by more than 4,000 companies around the world. Andrew Sever is company Co-Founder and CEO.


    Photo by Pixabay

    Views: 44

    [ad_2]

    David Penn

    Source link

  • Nancy Guthrie, Savannah Guthrie’s Mom, Being Held For Ransom; Alleged Kidnappers Demand Millions in Bitcoin: Report

    [ad_1]

    Reading Time: 3 minutes

    We have a bizarre twist to report in the disappearance of Savannah Guthrie’s mother, Nancy Guthrie.

    The editors of TMZ allege that they’ve received a ransom note demanding that millions in Bitcoin be delivered to a specific account in exchange for Nancy’s release.

    As we previously reported, Nancy, 84, went missing from her home on Saturday night.

    Savannah Guthrie attends the "Mostly What God Does" book presentation on February 21, 2024 in New York City.
    Savannah Guthrie attends the “Mostly What God Does” book presentation on February 21, 2024 in New York City. (Photo by Jamie McCarthy/Getty Images)

    Her family placed a 911 call reporting her missing after she failed to show up for court the following morning.

    Police now say that it looks as though Nancy was “harmed” in her home and taken against her will.

    They have ruled out the possibility that she may have wandered off on her own, explaining that she does not suffer from any cognitive issues, but does have mobility problems that would prevent her from traveling far on foot.

    Police say they are “aware of reports circulating about possible ransom note(s) regarding the investigation into Nancy Guthrie.”

    Journalist Savannah Guthrie attends The Hollywood Reporter 35 Most Powerful People In Media 2017 at The Pool on April 13, 2017 in New York City.  Journalist Savannah Guthrie attends The Hollywood Reporter 35 Most Powerful People In Media 2017 at The Pool on April 13, 2017 in New York City.
    Journalist Savannah Guthrie attends The Hollywood Reporter 35 Most Powerful People In Media 2017 at The Pool on April 13, 2017 in New York City. (Photo by Jamie McCarthy/Getty Images for The Hollywood Reporter)

    The letter, they said, will go “directly to our detectives who are coordinating with the FBI.” They have yet to confirm or deny the authenticity of the letter.

    “We’re downloading and analyzing cell phones, obtaining cell tower information, conducting interviews, and providing any and all investigative support that the sheriff’s department needs,” FBI Assistant Special Agent in Charge Jon Edwards told NPR this week.

    Needless to say, this story grows more mysterious and more troubling by the day.

    On Monday, the Guthrie family requested that all Tucson residents and anyone with any information about Nancy’s whereabouts cooperate with police to help bring her home.

    Later that night, Savannah took to Instagram and asked her followers to pray for Nancy.

    “We believe in prayer. We believe in voices raised in unison, in love, in hope. We believe in goodness. We believe in humanity. Above all, we believe in Him,” Savannah wrote on Instagram late Monday night.

    Savannah Guthrie attends the "Mostly What God Does" book presentation on February 21, 2024 in New York City. Savannah Guthrie attends the "Mostly What God Does" book presentation on February 21, 2024 in New York City.
    Savannah Guthrie attends the “Mostly What God Does” book presentation on February 21, 2024 in New York City. (Photo by Jamie McCarthy/Getty Images)

    “Thank you for lifting your prayers with ours for our beloved mom, our dearest Nancy, a woman of deep conviction, a good and faithful servant. Raise your prayers with us and believe with us that she will be lifted by them in this very moment,” she continued, adding:

    “We need you.

    “He will keep in perfect peace those whose hearts are steadfast, trusting in the Lord.’ a verse of Isaiah for all time for all of us. Bring her home,” Guthrie concluded.

    The post promptly received hundreds of thousands of likes, along with supportive comments from many of Savannah’s celebrity friends.

    We will have further updates on this developing story as new information becomes available.

    [ad_2]

    Tyler Johnson

    Source link

  • Equifax Unveils Credit Abuse Risk to Combat First-Party Fraud – Finovate

    [ad_1]

    • Data, analytics, and technology company Equifax unveiled Credit Abuse Risk, a new solution to help lenders fight first-party fraud.
    • The new offering leverages machine learning to identify common first-party fraud tactics such as credit washing and loan stacking.
    • News of Equifax’s Credit Abuse Risk predictive model comes on the heels of the launch of the company’s Synthetic Identity Risk tool. The solution empowers institutions to identify when fraudsters are using fake identities to set up credit accounts and obtain loans.

    A new offering from international data, analytics, and technology company Equifax will help protect lenders from first-party fraud. Credit Abuse Risk is a new predictive model that leverages FCRA-regulated data to spot fraud tactics such as credit washing and loan stacking. The model will help lenders make more confident lending decisions.

    “By focusing on application behavior in real time, Credit Abuse Risk quickly helps to reduce the potential for fraud and related costs,” Equifax Chief Product Officer for US Information Solutions Felipe Castillo said. “This supports a more confident lending environment and helps keep credit available for consumers.”

    In a world of phishing and deepfakes, first-party fraud is a type of financial crime that often goes overlooked in conversations about fraud prevention. First-party fraud, unlike third-party fraud, involves fraud committed by the actual customer or account holder rather than by an external party impersonating someone else. Credit Abuse Risk is designed to detect two specific forms of first-party fraud: loan stacking, in which an individual applies for multiple loans in a short period of time with no intention of repaying the debt, and credit washing, in which an individual attempts to remove accurate but negative information from their credit report. Credit Abuse Risk identifies the behaviors associated with these types of fraud during prequalification, account origination, or portfolio review, enabling lenders to adjust loan terms based on FCRA-compliant insights.

    Powered by machine learning, Credit Abuse Risk offers enhanced insights derived from behavioral indicators that detect atypical credit activity, and provides targeted decisioning that addresses the lifecycle of fraud. Credit Abuse Risk features comprehensive portfolio protection covering all credit tiers and actionable intelligence that empowers lenders to make real-time, regulated decisions on credit terms. This includes FCRA-compliant scoring with adverse action reason codes to ensure transparency in the event of application denials, restrictive credit term modifications, and related actions.

    Credit Abuse Risk is part of Equifax’s suite of fraud solutions and works alongside the company’s Synthetic Identity Risk tools. Introduced earlier this month, Equifax’s Synthetic Identity Risk uses machine learning algorithms to detect fraud patterns—such as those related to synthetic identity fraud—that are often difficult to spot using traditional methods. Synthetic identity fraud occurs when a fraudster combines aspects of a real identity with fake data to create a new, fictitious identity. The fraudster then uses these fictitious identities to open credit accounts and secure loans on which they eventually stop making payments. The fact that these synthetic identities often include real data and appear in mostly legitimate means that these frauds can be difficult to detect and can persist for long periods of time. Equifax estimates that charge-offs per known synthetic identity cost companies on average $13,000.

    “Synthetic identity fraud is a rapidly growing threat impacting the consumer lending ecosystem,” Castillo said. “With Synthetic Identity Risk, Equifax strengthens lenders’ fraud defenses, helping them to uncover hidden risks and ultimately shift from reactive loss recovery to proactive prevention. In doing so, they not only reduce their financial losses but they (also) safeguard and build long-term trust with their legitimate customers.”

    Headquartered in Atlanta, Georgia, Equifax made its Finovate debut at FinovateFall 2011 in New York. The company’s differentiated data, analytics, and cloud technology help financial institutions, companies, employers, and public agencies make better decisions with more confidence. Along with Experian and TransUnion, Equifax runs one of the three major credit reporting agencies in the US, has nearly 15,000 employees around the globe, and operates or has investments in 24 countries in North America, Central and South America, Europe, and the Asia-Pacific region.

    Equifax is publicly traded on the NYSE under the ticker EFX and has a market capitalization of $24 billion.


    Photo by Growtika on Unsplash

    Views: 44

    [ad_2]

    David Penn

    Source link

  • FinovateEurope 2026 Is Almost Here: What You Need to Know Before You Go – Finovate

    [ad_1]


    The countdown is on! FinovateEurope 2026 lands in London on February 10 through 11 at the InterContinental O2 in London, and the global fintech community is gearing up for one of the year’s most engaging events.

    The two-day conference will feature more than 1,000 senior decision-makers, including bankers, investors, founders, and fintech leaders as they uncover what’s next in fintech and banking. You’ll see over 20 live demos of cutting-edge technology with 100+ expert speakers offering insights that go well beyond buzzwords.

    If you already have your ticket (if you don’t, there’s still time to register), here’s how to make the most of your days on-site:

    • Download the ConnectMe app and create your profile to start networking, set your schedule, and view the agenda.
    • The invitation-only Leaders+ and Impact+ sessions begin on February 9 at 6:00 pm.
    • Registration and networking begins at 8:15 am on February 10 and the day concludes with the Best of Show announcement during the evening cocktail reception, which starts at 4:30 pm.
    • Breakfast and networking begins at 8:15 am on February 11 and the day concludes with the Investor All Stars panel, which wraps up at 4:30 pm.
    • Bring your badge each day. You’ll need it for entry!
    • Plan your travel time to the venue, especially if you’re commuting or taking public transport.
    • Dress code? Business casual to business formal. Be comfortable, but ready to make an impression.
    • Need help? Stop by the registration desk or find a Finovate team member for assistance.
    • Follow #FinovateEurope on LinkedIn and Twitter for live updates and key takeaways.

    Whether your goal is to track early fintech trends, forge new partnerships, or benchmark your strategy against peers, FinovateEurope delivers. With elite networking, live product insights, and industry-shaping conversations all under one roof, this conference promises to kick off 2026 with fresh ideas and real momentum.

    See you in London!

    Views: 386

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • Varo Raises $123.9 Million to Scale its Lending and Banking Platform – Finovate

    [ad_1]

    • Varo raised $123.9 million in a Series G round led by Warburg Pincus and Coliseum Capital.
    • The bank will use the investment to scale its chartered banking and lending platform.
    • Alice Milligan, former chief marketing officer at Morgan Stanley, and Kevin Watters, former division chief executive officer at JPMorgan, have joined Varo’s Board of Directors.

    Digital challenger bank Varo landed $123.9 million in financing this week. The Series G round, which boosts Varo’s total funding to $1.1 billion, was led by existing investor Warburg Pincus and new investor Coliseum Capital Management. Also contributing to today’s investment are existing investors such as Northview.

    For new investor Coliseum Capital Management, the appeal lies in Varo’s ability to use its charter to compete with incumbent banks while expanding its product depth. “We are thrilled to join Warburg Pincus as long-term, collaborative partners, and support Varo’s work to expand its customer value proposition and to further differentiate from traditional banks,” said Coliseum Capital Management co-founder and Managing Partner Chris Shackelton. “We believe Varo is building a resilient and scalable platform from which to capitalize on a significant market share opportunity.”

    Varo was founded in 2017 and secured a bank charter three years later. The fintech’s banking platform brings digital-first bank tools, from money management to lending, credit building, and savings accounts and tools. Varo offers two lending products, Varo Advance and Varo Line of Credit, which together generated $547 million in volume last year. The bank’s lending tools are powered by the company’s machine learning models that supplement traditional credit data, allowing the bank to lend to non-traditional borrowers.

    As part of today’s announcement, Varo disclosed that Alice Milligan, former chief marketing officer at Morgan Stanley, and Kevin Watters, former division chief executive officer at JPMorgan, have joined its Board of Directors.

    From a governance and operating perspective, Varo’s board sees the company’s combination of regulated banking discipline and modern technology as a key differentiator in a crowded challenger market. “Varo has built something rare: a technology-first customer experience paired with the governance and risk discipline required of a nationally chartered bank,” said Varo Bank Board of Directors Alice Milligan and Kevin Watters. Watters reports that Varo will use today’s funds to support the company’s next phase of growth by scaling its lending and banking platform.

    “This combination of new capital, Coliseum’s partnership, and experienced banking leaders joining our board, is propelling Varo into its next phase of growth,” said Varo Bank CEO Gavin Michael. “We remain focused on operating with discipline and delivering meaningful impact for our customers.”

    US-based Varo is one of the few true challenger banks that operate with their own bank charter, a structural advantage that gives it direct control over deposits, lending, customers, and unit economics. But a charter alone does not guarantee scale. Varo is still small when compared to competitors such as Chime, which operates under a sponsor banking model and has tens of millions of users. And while SoFi is Varo’s closest chartered competitor, the gap between the two is widening. SoFi recently reported record Q4 2025 results, including $1 billion in net revenue, $174 million in net income, and one million new members added in a single quarter.

    As bank charters increasingly become table stakes in the challenger banking field, Varo will need to focus on scaling by differentiating its offerings and channels to reach new markets, especially as international players like Nubank, which just received regulatory approval to operate in the US, bring their customer-winning strategies to the US.


    Photo by Landiva Weber

    Views: 657

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • Fintech Rundown: A Rapid Review of Weekly News – Finovate

    [ad_1]

    Welcome to the first week of February! Both FinovateEurope and Valentine’s Day are just around the corner, and there’s lots to love about this week’s fintech news headlines. Below, we’ve aggregated the top news in fintech for the week. We’ll continue to add more announcements as the week progresses.


    Payments

    Payments platform PPRO and Southern European Buy Now, Pay Later (BNPL) solution provider Scalapay announce partnership.

    Verisave launches credit card processing fee optimization program for professional services firms.

    NCR Atleos and Heart of England Co-operative extend relationship to enhance financial inclusion.

    STAR Financial Bank partners with CorServ to meet demand for enhanced commercial credit cards.

    dLocal partners with DHL Express Brazil to automate Pix payments and accelerate parcel release.

    Wealth management

    UK-based Novum Investment Management secures investment form UK local government pension fund to launch and scale Doris, a new offering to help transition people from saving to investing.

    Envestnet appoints Jonathan Linstra as Chief Growth Officer (CGO). 

    Arcesium acquires Limina to deliver a unified front-to-back investment platform.

    Back office tools

    HuLoop and Ceto partner to advance adaptive work optimization for financial institutions.

    Embedded lending

    Affirm expands buy now pay later network with Expedia.

    Digital banking

    OnePay names Patrick O’Connell Chief Financial Officer.

    Afin Bank introduces new Chief Risk Officer Rebecca Griffin.

    DeFi

    NymCard enables stablecoin settlement with Visa in the Gulf Cooperation Council (GCC) region including countries such as Saudi Arabia, the UAE, and Oman.

    Credit, data, and analytics

    Analytics software firm FICO forges global partnership with technology consulting and digital solutions provider Tech Mahindra to help companies integrate AI-powered decisioning and advanced analytics.

    Digital identity and verification

    LexisNexis Risk Solutions announces the availability of LexisNexis IDVerse for Insurance, an AI-powered document authentication and identity verification solution.


    Photo by Monstera Production

    Views: 501

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • Under Armour data breach claims trigger alerts for millions of users

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Sportswear and fitness brand Under Armour is investigating claims of a massive data breach after customer records were posted on a hacker forum. 

    The breach became widely known after millions of people received alerts warning their information may have been compromised. While Under Armour says its investigation is ongoing, cybersecurity researchers reviewing the leaked data say it appears to include personal details potentially linked to customer purchases.

    According to breach notification service Have I Been Pwned, the dataset contains email addresses linked to approximately 72 million people, prompting the organization to notify affected users directly. The scale of the exposure has raised new concerns about how consumer data can be misused long after a breach occurs.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS  

    Millions of Under Armour customers were alerted after stolen account data surfaced on a hacker forum, bringing the breach into public view. (Thomas Trutschel/Photothek via Getty Images)

    What happened in the Under Armour data breach

    The stolen data is reportedly linked to a ransomware attack that occurred in November 2025. At the time, the Everest ransomware group claimed responsibility and attempted to extort Under Armour by threatening to leak internal files. In January 2026, customer data from that incident appeared publicly on a popular hacking forum. Soon after, breach notification service Have I Been Pwned obtained a copy of the data and alerted affected users by email. According to reports, the seller claimed the stolen files came directly from the November breach and included millions of customer records.

    What data was exposed

    The leaked dataset reportedly includes a broad range of personal information. While payment card details have not been confirmed, the exposed data is still valuable to cybercriminals.

    Compromised information may include:

    Researchers also found email addresses belonging to Under Armour employees within the data. That increases the risk of targeted phishing and business email compromise scams.

    Under Armour’s response so far

    “We are aware of claims that an unauthorized third party obtained certain data,” an Under Armour spokesperson told CyberGuy. “Our investigation of this issue, with the assistance of external cybersecurity experts, is ongoing. Importantly, at this time, there’s no evidence to suggest this issue affected UA.com or systems used to process payments or store customer passwords. Any implication that sensitive personal information of tens of millions of customers has been compromised is unfounded. The security of our systems and data is a top priority for UA, and we take this issue very seriously.”

    Why this breach matters

    Even without passwords or payment details, this breach still poses serious risks. Names, email addresses, birth dates and purchase history can be used to create highly convincing scams. Cybercriminals often reference real purchases or account details to gain trust. As a result, phishing emails tied to this breach may appear legitimate and urgent. Over time, exposed data like this can also be combined with other breaches to build detailed identity profiles that are harder to protect against.

    How to check if your passwords were stolen

    To see if your email was affected, visit the Have I Been Pwned website. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the leak. When done, come back here for Step 1 below.

    Ways to stay safe after the Under Armour data breach

    If you received a breach alert or believe your information may be included, taking action now can reduce your risk later.

    1) Change reused passwords and use a password manager

    If you reused the same password on other sites, change those passwords right away. Even if Under Armour says passwords were not affected, exposed email addresses are often used in follow-up attacks. A password manager makes this easier. It creates strong, unique passwords for each account and stores them securely. That way, one breach cannot unlock multiple accounts.

    woman working on budget

    The leaked data reportedly includes email addresses, birth dates and purchase details, which can be exploited in targeted phishing scams. (Kurt “CyberGuy” Knutsson)

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    2) Watch for phishing emails tied to Under Armour

    Cybercriminals often move fast after a breach. As a result, emails that appear to come from Under Armour or fitness brands may land in your inbox. Be cautious of messages that claim there is an issue with your account or a recent purchase. Do not click links or open attachments in unexpected emails. Instead, go directly to the company’s official website if you need to check your account. Using strong antivirus software can also help block malicious links and attachments before they cause harm.

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Turn on two-factor authentication everywhere you can

    Two-factor authentication (2FA) adds an extra layer of protection. Even if someone gets your password, they still need a second step to log in. Turn it on for email accounts first. Then enable it for shopping, fitness and financial accounts. This single step can stop many account takeover attempts linked to breached data.

    4) Monitor for password reset attempts and account alerts

    After a breach, attackers often test stolen email addresses across multiple sites. That activity can trigger password reset emails you did not request. Pay close attention to these alerts. If you see one, secure the account immediately by changing the password and reviewing recent activity.

    5) Be skeptical of messages that reference past purchases

    This breach included purchase information, which makes scams more convincing. Attackers may reference real products or order details to earn your trust. Treat any message that pressures you to act quickly as suspicious. Legitimate companies do not demand immediate action by email or text.

    6) Reduce your exposure with a data removal service

    Over time, exposed personal data often ends up with data brokers. These companies collect and sell profiles that scammers use for targeting. A data removal service can help you request the deletion of your information from these databases. Reducing what is publicly available makes it harder for criminals to build detailed profiles.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Under Armour Outdoor store in China

    Security experts warn that even without payment data, exposed personal information can fuel fraud long after a breach is discovered. (Cheng Xin/Getty Images)

    Kurt’s key takeaways

    The Under Armour data breach is a reminder that even major global brands can become targets. While payment systems appear unaffected, the exposure of personal data still creates long-term risks for millions of customers. Data breaches often unfold over time. What starts as leaked records can later fuel scams, identity theft and targeted attacks. Staying alert now can reduce the chance of bigger problems later.

    If your personal shopping or fitness data were exposed in a breach like this, would you keep using the brand or move on to a competitor? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Nubank Lands US Regulatory Approval – Finovate

    [ad_1]

    • Nubank has received conditional approval from the US OCC to form a national bank, marking a major regulatory milestone as it begins the setup phase for entering the US market.
    • Unlike past challenger bank attempts, Nubank enters the US from a position of strength, with more than 127 million customers, strong engagement, and $783 million in quarterly net income.
    • Regulators require Nubank to fully fund the bank within 12 months and begin operations within 18 months.

    Brazil-based digital bank Nubank (also known as Nu) just achieved a long-standing goal. The fintech received conditional approval from the US OCC for the formation of a de novo national bank, Nubank, N.A.

    Announcing the approval, Nu Founder and CEO David Vélez framed the move as a strategic validation of the company’s long-held belief in digital-first banking. “This approval isn’t just an expansion of our operation; it’s an opportunity to prove our thesis that a digital-first, customer-centric model is the future of financial services globally,” said Vélez. “While we remain fully focused on our core markets in Brazil, Mexico, and Colombia, this step allows us to build the next generation of banking in the United States.”

    The conditional approval, granted about four months after Nu initially submitted its application, places the company in the early setup stage of forming a US national bank. During this period, Nu must meet a series of requirements set by the OCC and secure additional approvals from the FDIC and the Federal Reserve. Regulators also require the company to fully fund the bank within 12 months and begin operations within 18 months.

    After Nu receives full regulatory approval for a national bank charter, it will operate under a comprehensive federal framework that allows it to launch deposit accounts, credit cards, lending, and digital asset custody. Nu plans to establish strategic hubs in Miami, San Francisco, Northern Virginia, and the North Carolina Research Triangle.

    Cristina Junqueira, Nu’s co-founder and CEO of its emerging US business, highlighted the regulatory milestone as a step toward establishing credibility and competitiveness in a crowded market. “Receiving federal approval for a national bank charter is a significant step in our journey to becoming a solid, compliant, and competitive regulated institution in the US,” said Junqueira. “We look forward to delivering the transparent, efficient financial experiences already trusted by more than 127 million customers around the world to our future customers in the US.”

    Founded in 2013, Nu has operated in its home country of Brazil as a fully regulated financial institution since 2016 and announced that it plans to obtain its full banking license this year. The fintech also operates in Colombia and has an expansion plan in Mexico, where it is waiting on approval from the Comisión Nacional Bancaria y de Valores to organize as a banking institution.

    While international expansion efforts have been slow, the company’s customer acquisition growth has not. With more than 127 million customers, Nu is known throughout fintech for its high customer engagement level, reaching an activity rate exceeding 83%. In the third quarter of last year, the fintech reached a record revenue of $4.2 billion, which represents a 39% year-over-year growth.

    It’s important to note that Nu’s entrance into the US market will likely succeed where other challenger banks have failed. Monzo, N26, and Bunq have all tried and failed to secure a US license from the OCC, while Revolut still does not have a US banking license, either. The difference is that Nu is massively profitable with relatively low customer costs. The company reported $783 million in net income in the last quarter alone.

    For Nu, which caters to a largely Hispanic customer base, the US is full of opportunity. There are more than 65 million Hispanics living in the US, many of whom are left out of traditional banks in the US due to high fees, limited access to credit, and legacy onboarding models that fail to reflect their financial realities. Nu’s success in Latin America has been built on designing for inclusion at scale. The fintech boasts transparent pricing, an intuitive digital experience, and unique underwriting. Bringing this successful model to the US while navigating one of the world’s most demanding regulatory environments, would be a huge win for Nu, and perhaps could serve as a model for other overseas challengers seeking to launch in the US.


    Photo by Steppe Walker

    Views: 4

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • 10x Banking Inks Partnership with Alternative Asset Manager Remara – Finovate

    [ad_1]

    • Core banking platform 10x Banking has teamed up with Australian asset manager and lender Remara.
    • Remara will use 10x Banking’s core banking platform to bring new lending and investment solutions to market faster.
    • Headquartered in London, 10x Banking won Best of Show in its Finovate debut at FinovateEurope 2023.

    Cloud-native core banking platform 10x Banking announced a partnership with Australian asset manager and alternative lender Remara. The firm will leverage 10x Banking’s core banking platform to launch new mortgage, commercial lending, term investment, and novated lease products faster.

    The Sydney-based firm sought a partner that could support the unique financial products Remara offers to its clients. The company highlighted 10x Banking’s API-first and event-driven architecture, which will enable Remara to bring new products to market quickly and give the company the control it needs to differentiate its offerings. The new core banking platform will also support Remara as it scales across Australia and the Southeast Asian region. The company noted in its partnership statement that the APAC core banking market is expected to grow by more than 10% CAGR through 2032.

    “Remara’s decision to select 10x reflects both the maturity of Australia’s alternative lending scene and the broader shift towards next-generation core technology in the region,” 10x Banking Founder and CEO Antony Jenkins said. “We’re committed to supporting innovative financial providers that make banking better for everyone. Our partnership with Remara is the latest proof point that cloud-native platforms deliver real differentiation and tangible value, both to businesses and end users. This is our ninth ANZ client, underlying the impact our local strategy is having for new and established players.”

    Headquartered in Sydney, New South Wales, Australia, Remara is an alternative asset manager that offers specialty finance, middle-market lending, and tactical credit strategies that are not typically available to investors via banks or traditional brokers. Remara offers at-call, 6-month, and 12-month cash management funds; investment grade, high-yield, and credit income funds; as well as a real estate fund that provides exposure to small and medium scale developments. Founded in 2019, Remara has more than $3 billion AUD in assets under management.

    “10x Banking’s platform puts us in the driving seat for product and delivery flexibility, letting Remara go to market faster with innovative, specialist lending solutions that really meet our customers’ needs,” Remara Managing Partner Andrew McVeigh said. “Australia’s financial services sector is modernizing fast, and being able to offer something different to the market is vital. With 10x, we can do that, building on a best-of-breed core foundation and executing on our vision for growth.”

    10x Banking was founded in 2016, and won Best of Show in its Finovate debut at FinovateEurope 2023. The company’s technology enables banks to deploy next-generation core banking solutions via a cloud-native, SaaS core banking platform. This empowers firms to deliver new products, services, and customer experiences to customers—both retail and corporate—faster and with less cost. 10x Banking’s partnership announcement with Remara comes a little over a month after the company reported that it was working with Audax Financial Technology to help banks in Asia Pacific, Europe, and the Middle East scale new digital products and services and modernize their core banking systems.


    Photo by Johnny Bhalla on Unsplash

    Views: 235

    [ad_2]

    David Penn

    Source link

  • Beyond the Demos: The Industry Stage Conversations Driving FinovateEurope 2026 – Finovate

    [ad_1]

    As FinovateEurope returns to London on February 10 and 11, the spotlight on the second day of the conference shifts from demos to deep discussion. On February 11, FinovateEurope’s Industry Stages run in parallel with one another, giving attendees the opportunity to dive into strategic conversations shaping financial services in 2026.

    This year’s event features five Industry Stages: Artificial Intelligence; Banking, Regulation & Risk; Customer Experience; Lending; and Payments. Each stage is designed to offer banking and fintech leaders more than just theory. The sessions focus on what’s working in practice, what’s breaking under the pressure of new technology and regulations, and what institutions need to rethink about their current operations.


    Artificial Intelligence: from pilots to production

    The AI stage will feature discussions on one of the biggest challenges facing financial institutions today: moving beyond experimentation. The sessions will explore lessons learned from early AI agent pilots, governance frameworks to combat “shadow AI”, and how banks can scale AI responsibly. Highlights include a keynote from Richard Davies, CEO of Allica Bank, who will speak about the realities of implementing AI in production. The stage will also host panels tackling ROI, data readiness, and responsible AI as a competitive necessity.

    Customer Experience: personalization without losing the human touch

    On the Customer Experience stage, the conversation moves past buzzwords to focus on execution. Sessions will examine how open data enables hyper-personalization, why mindset can be the biggest challenge, and how banks can retain empathy while scaling. A standout power panel brings together leaders from J.P. Morgan, Invesco, and PolyAI to explore what banks can learn from other industries as customer expectations are being reset by the evolution of enabling technologies.

    Payments: instant, intelligent, and under threat

    Payments are quickly evolving across the globe, especially with new regulations such as PSD3 and new capabilities and enabling technologies such as instant payments, stablecoins, and cross-border modernization. Panels will focus on how data-centricity and AI can unlock growth while strengthening security, especially as fraud losses and cyber threats keep rising.

    Banking, regulation & risk: resilience in a volatile world

    Regulatory pressure and operational resilience will be the center of the conversation on this stage, where discussions will span DORA, dispute management, and the risks embedded in cloud and AI adoption. These sessions are especially relevant for banks navigating complex vendor ecosystems while being asked to do more, faster, and with greater accountability.

    Lending: capturing the embedded opportunity

    The Lending stage will look at how banks can reclaim growth by meeting unmet needs, especially in small business and embedded lending. Panelists will explore how AI is reshaping credit decisioning, how regulation is evolving, and where incumbents can realistically compete with fintech challengers.


    Together, these five Industry Stages on February 11 will offer a concentrated look at the decisions that will define banking’s next chapter. If you register for FinovateEurope before January 30, you can still save £300.

    Views: 241

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • ThetaRay Launches Ray, An Agentic AI Investigation Suite  – Finovate

    [ad_1]

    • ThetaRay has launched Ray, an Agentic AI investigation suite designed to help banks automate and standardize transaction monitoring investigations amid rising alert volumes and regulatory scrutiny.
    • The platform targets growing regulatory demands from frameworks such as the EU’s AMLR and FinCEN’s AML/CFT directives by delivering faster, more consistent, and audit-ready investigations with traceable, explainable AI.
    • Ray helps firms create compliance-critical workflows and scale AML operations without relying on manual processes or increasing headcount.

    Financial crime detection company ThetaRay has launched a new set of tools to help firms keep up with evolving regulations in the face of advanced fraud. Called Ray, the new Agentic AI investigation suite aims to help banks conduct transaction monitoring investigations.

    Ray is embedded into ThetaRay’s Investigation Center, an Agentic investigation suite designed for banks, fintechs, and payments platforms balancing high alert volumes with rising regulatory demands. Ray combines autonomous investigations with on-demand analyst support. The fintech anticipates Ray will ultimately help banks reduce the time it takes to resolve cases and create more consistency in investigations that span internal teams and jurisdictions. ThetaRay created Ray to autonomously handle the full investigation by validating the geolocation, analyzing patterns, and scanning adverse media to prepare a structured, audit-ready case-file document.

    The launch is strategic and comes at a time when regulators across the globe are raising their expectations for investigative quality and documentation. The EU’s new Anti-Money Laundering Regulation (AMLR) and AML Authority framework require stronger due diligence, more rigorous monitoring and record-keeping, and consistent compliance controls across jurisdictions. In the US, FinCEN’s AML and Counter Financing of Terrorism (CFT) directives require transparent, evidence-based investigations and Suspicious Activity Report (SAR) narratives.

    “This is an incredibly important moment for us and for the industry,” said ThetaRay CEO Brad Levy. “I couldn’t be more energized by the opportunity to tackle one of the biggest challenges in financial crime compliance. Our mission is simple: to help make global markets more modern and secure for all. The future will be shaped by people who care and by megatechs and specialized fintechs working closely together to raise the bar for transparency, accountability, and lasting trust.”

    However, as regulators require higher investigative quality, documentation, and more defensible decisions, alert volumes continue to rise and place a strain on investigation teams, requiring manual data gathering.

    “Financial institutions are moving beyond experimentation toward real, production-grade use of Agentic AI in compliance-critical environments,” said Microsoft Global Head of AI Strategy and GTM for Payments and Banking Tyler Pichach. “Platforms like Ray demonstrate how Agentic AI, when deployed on a secure and governed cloud like Microsoft Azure, can help banks modernize complex investigation workflows while meeting regulatory expectations for transparency, control, and trust.”

    With Ray, firms can prepare for this increased strain by using it to automate evidence collection, behavioral and counterparty analysis, open-source checks, and document review and narrative generation. Built and deployed on Microsoft Azure, Ray offers an on-demand AI assistant that supports questions from analysts and deeper exploration.

    “Manual investigations inevitably vary from analyst to analyst. Ray introduces a consistent reasoning framework across the entire operation, reducing subjectivity, and ensuring that each case, no matter who handles it, stands up to scrutiny,” said ThetaRay Regulatory Affairs Manager David Shapiro. “Most importantly, Ray was built so that every decision is traceable back to evidence. In a regulatory environment that demands transparency, AI explainability is the foundation.”

    As regulators require more defensible, consistent, and transparent investigations, financial institutions are under pressure to modernize workflows that rely on manual analysis and fragmented tools. By embedding Agentic AI directly into the investigation process, ThetaRay is positioning Ray amid the next generation of AML operations in which regulators require speed, consistency, and explainability.

    Founded in 2013, ThetaRay offers transaction monitoring, transaction and customer screening, and customer risk assessment suites to help firms fight financial crime. The Israel-based company helps its 100+ institutional clients leverage AI to monitor 15 billion transactions valued at $20 trillion on an annual basis.


    Photo by cottonbro studio

    Views: 26

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • 5 myths about identity theft that put your data at risk

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn’t even realize were public: old addresses, family connections, phone numbers and shopping habits. 

    All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it’s a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they’re “careful enough.” 

    Let’s break them down.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.   

    Myth #1: ‘I wasn’t in a data breach, so I’m safe’

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    Identity theft often starts quietly, with bits of personal information collected and shared long before a scam ever happens. (Kira Hofmann/picture alliance via Getty Images)

    Reality: You don’t need to be in a breach to have your data exposed.

    Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you’ve never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you.

    Actionable tips:

    • Don’t assume “no breach” means “no risk”
    • Avoid oversharing details on social media
    • Remove your personal data from data broker sites so it can’t be reused

    Myth #2: ‘Scammers don’t have enough info to impersonate me’

    Reality: They usually have more than enough.

    Scammers don’t need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:

    This is why scams often feel unsettlingly personal.

    Actionable tips:

    • Be suspicious of messages that reference personal details
    • Don’t confirm information just because the sender “knows” something about you
    • Reduce what’s available by removing your data from broker databases

    Myth #3: ‘Retirees aren’t targeted because they’re cautious’

    Reality: Retirees are one of the most targeted groups.

    Why? Because scammers assume:

    • Stable income from pensions or benefits
    • More savings
    • Greater trust in official-looking messages
    • Less familiarity with newer scam tactics

    Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate “Tax Resolution Oversight Department” that tries to steal your money.

    Actionable tips:

    • Never act on urgent requests involving benefits or finances
    • Verify messages by contacting organizations directly
    • Encourage family discussions about scams and warning signs
    • Remove publicly available data that helps scammers profile retirees
    Person typing on computer

    Data brokers build detailed profiles using public records, apps, purchases and loyalty programs, even if you have never been hacked. (Kurt “CyberGuy” Knutsson)

    Myth #4: ‘Credit monitoring will stop identity theft’

    Reality: Credit monitoring only tells you after something has gone wrong.

    It doesn’t stop scammers from:

    • Targeting you
    • Attempting account takeovers
    • Using your information in phishing or social engineering scams

    Think of credit monitoring like a smoke alarm-helpful, but it doesn’t prevent the fire.

    Actionable tips:

    • Use credit monitoring as a backup, not your main defense
    • Lock down accounts with strong passwords and two-factor authentication
    • Reduce exposure by removing your data before it’s misused

    Myth #5: “There’s nothing I can do about data brokers”

    Reality: You can take control, but doing it manually is time-consuming and frustrating.

    Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That’s why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn’t quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    Why identity theft often starts long before you notice

    Identity theft rarely begins with a dramatic moment.

    It usually starts with:

    • Data collected quietly over the years
    • Profiles that grow more detailed with time
    • Information being sold and resold without your knowledge

    By the time fraud shows up on a credit report, the damage has often already been done.

    What you can do during Identity Theft Awareness Week

    If there’s one takeaway this week, it’s this: reducing your exposed data lowers your risk.

    1) Be skeptical of unexpected messages

    Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.

    2) Verify requests on your own

    If a message claims there’s a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message.

    3) Reduce your digital footprint with a data removal service 

    Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Turn on two-factor authentication

    Enable two-factor authentication (2FA) wherever it’s available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.

    5) Strengthen your account security

    Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Person on their smartphone.

    Scammers use this background data to sound legitimate, personalize their messages and pressure victims into acting fast. (Matt Cardy/Getty Images)

    6) Use identity theft protection software

    Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Help family members stay protected

    Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.

    Kurt’s key takeaways

    Identity theft isn’t about being careless; it’s about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won’t just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.

    Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • FinovateEurope 2026: Innovation, Regulation, and Transformation in the AI Era – Finovate

    [ad_1]

    What trends are driving fintech innovation in the UK and Europe as 2026 begins?

    With FinovateEurope 2026 kicking off in just two weeks, we are showcasing some of the major themes in banking and financial services that will be addressed—on the demo stage as well as through our keynote addresses, fireside chats, and panel discussions—when the conference begins on Tuesday, 10 February.

    From agentic AI to post-quantum cryptography, the enabling technologies of today are transforming banking and financial services. Making the most of these innovations to better serve customers, create new revenue streams, and successfully compete in an ever-more complex marketplace is the goal of every banker and financial services professional. Come see the solutions for yourself this year at FinovateEurope 2026.


    Innovations in Verification, Fraud Prevention, and Workflow Automation

    From the demo stage, expect to see a range of innovations in identity verification and fraud prevention. With the proliferation of technologies ranging from faster payments to agentic AI to digital assets, ensuring that consumers and businesses are able to engage in these services safely has become increasingly important. Additionally, with technologies like AI empowering a new generation of fraudsters and financial criminals, a wide range of innovators are developing solutions that target specific vulnerabilities and attack vectors with continuous surveillance and defense.

    Also among the top trends reflected in the demoing companies at this year’s FinovateEurope are innovations in embedded finance and open finance. As paths toward unlocking new revenue streams and deepening customer engagement, both embedded finance and open finance offer financial institutions unique opportunities and are increasingly supported by regulatory guidance in both the UK and across Europe.

    Another area where we will see a great deal of innovation this year at FinovateEurope is in workflow automation and system modernization. A number of companies will be demoing solutions that do everything from enhancing developer productivity to accelerating compliance readiness to managing complex models and calculations for banks and other financial institutions. The sheer variety of startups in this space—many of them hailing from Eastern and Central European nations—is a testament to the range of challenges that fintech is capable of solving. It also speaks well of the number of technologists from outside of fintech that are turning their talents toward problems in banking and financial services.


    Modernization and Transformation in the Age of AI

    Many of the same themes from the live demos will also be manifest on the plenary stage. With regard to modernization, for example, FinovateEurope will examine the ways that fintech, AI, and the cloud could help transform legacy banking. The conference will also look at the challenge of modernizing legacy authentication, specifically by moving to technologies like post-quantum cryptography (PQC) that are designed to secure systems against threats from quantum computers. To the problem of fraud and financial crime, speakers will discuss the use of network APIs to fight scams and how banks and fintechs can work together to meet the unique cybersecurity challenges of the AI age. Accomplishing all of this while avoiding additional friction for the user is a top theme and chief concern for banks and financial services companies alike.

    Other key themes such as personalization, open banking, and open finance will also be topics of discussion at this year’s conference. Both in the context of wealth management and retail banking, open data promises not only more engaging, personalized experiences for customers, but also provides financial institutions with better, more data-driven decision-making; more efficient operations; and better risk management.

    Unsurprisingly, AI continues to be a main theme in any conversation on technology, banking, and financial services. FinovateEurope’s keynotes and special addresses will investigate issues such as how generative AI is shaping the future of mobile banking as well as the rise of agentic AI and the challenge of “nonhuman customers” such as AI-powered bots and agents. Other presentations will discuss the EU’s AI Act and its implications for banks and financial services providers, as well as “lessons learned” from tech giants like Google, Meta, and Microsoft and their AI innovation journeys.

    It is fair to say that innovations in AI continue to drive what’s possible in fintech, and the number of mainstage special addresses at FinovateEurope covering different use cases and applications of AI reflect this fact. Indeed, for another year, FinovateEurope is featuring an industry stage dedicated specifically to applications of AI for banking and financial services. But while AI is a clearly major force in technological innovation, it is just one of a number of technologies—along with open finance/banking/data, embedded finance, and DeFi—that continues to transform fintech.

    FinovateEurope 2026 comes to London’s Intercontinental O2, 10 February through 11 February. Tickets to the conference are on sale now. Register today to save your spot at the first big fintech event of the year!


    Photo by Samuel Sweet

    Views: 130

    [ad_2]

    David Penn

    Source link

  • Why clicking the wrong Copilot link could put your data at risk

    [ad_1]

    NEWYou can now listen to Fox News articles!

    AI assistants are supposed to make life easier. Tools like Microsoft Copilot can help you write emails, summarize documents and answer questions using information from your own account. But security researchers are now warning that a single bad link could quietly turn that convenience into a privacy risk. 

    A newly discovered attack method shows how attackers could hijack a Copilot session and siphon data without you seeing anything suspicious on screen.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.     

    Because Copilot stays tied to your logged-in Microsoft account, attackers can quietly use your active session to access data in the background. (Photo by Donato Fasano/Getty Images)

    What researchers discovered about Copilot links

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    Security researchers at Varonis uncovered a technique they call “Reprompt.” In simple terms, it shows how attackers could sneak instructions into a normal-looking Copilot link and make the AI do things on their behalf.

    Here’s the part that matters to you: Microsoft Copilot is connected to your Microsoft account. Depending on how you use it, Copilot can see your past conversations, things you’ve asked it and certain personal data tied to your account. Normally, Copilot has guardrails to prevent sensitive information from leaking. Reprompt showed a way around some of those protections.

    The attack starts with just one click. If you open a specially crafted Copilot link sent through email or a message, Copilot can automatically process hidden instructions embedded inside the link. You don’t need to install anything, and there are no pop-ups or warnings. After that single click, Copilot can keep responding to instructions in the background using your already logged-in session. Even closing the Copilot tab does not immediately stop the attack, because the session stays active for a while.

    How Reprompt works

    Varonis found that Copilot accepts questions through a parameter inside its web address. Attackers can hide instructions inside that address and make Copilot execute them as soon as the page loads.

    That alone would not be enough, because Copilot tries to block data leaks. The researchers combined several tricks to get around this. First, they injected instructions directly into Copilot through the link itself. This allowed Copilot to read information it normally shouldn’t share.

    Second, they used a “try twice” trick. Copilot applies stricter checks the first time it answers a request. By telling Copilot to repeat the action and double-check itself, the researchers found that those protections could fail on the second attempt.

    Third, they showed that Copilot could keep receiving follow-up instructions from a remote server controlled by the attacker. Each response from Copilot helped generate the next request, allowing data to be quietly sent out piece by piece. The result is an invisible back-and-forth where Copilot keeps working for the attacker using your session. From your perspective, nothing looks wrong.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    Varonis responsibly reported the issue to Microsoft, and the company fixed it in the January 2026 Patch Tuesday updates. There is no evidence that Reprompt was used in real-world attacks before the fix. Still, this research is important because it shows a bigger problem. AI assistants have access, memory and the ability to act on your behalf. That combination makes them powerful, but also risky if protections fail. As researchers put it, the danger increases when autonomy and access come together.

    It’s also worth noting that this issue only affected Copilot Personal. Microsoft 365 Copilot, which businesses use, has extra security layers like auditing, data loss prevention and admin controls.

    “We appreciate Varonis Threat Labs for responsibly reporting this issue,” a Microsoft spokesperson told CyberGuy. “We have rolled out protections that address the scenario described and are implementing additional measures to strengthen safeguards against similar techniques as part of our defense-in-depth approach.”

    8 steps you can take to stay safe from AI attacks

    Even with the fix in place, these habits will help protect your data as AI tools become more common.

    1) Install Windows and browser updates immediately

    Security fixes only protect you if they’re installed. Attacks like Reprompt rely on flaws that already have patches available. Turn on automatic updates for Windows, Edge and other browsers so you don’t delay critical fixes. Waiting weeks or months leaves a window where attackers can still exploit known weaknesses.

    2) Treat Copilot and AI links like login links

    If you wouldn’t click a random password reset link, don’t click unexpected Copilot links either. Even links that look official can be weaponized. If someone sends you a Copilot link, pause and ask yourself whether you were expecting it. When in doubt, open Copilot manually instead.

    Corporate signage of Microsoft Corp at Microsoft India Development Center

    Even after Microsoft fixed the flaw, the research highlights why limiting data exposure and monitoring account activity still matters as AI tools evolve. (Photographer: Prakash Singh/Bloomberg via Getty Images)

    3) Use a password manager to protect your accounts

    A password manager creates and stores strong, unique passwords for every service you use. If attackers manage to access session data or steal credentials indirectly, unique passwords prevent one breach from unlocking your entire digital life. Many password managers also warn you if a site looks suspicious or fake.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    4) Enable two-factor authentication on your Microsoft account

    Two-factor authentication (2FA) adds a second layer of protection, even if attackers gain partial access to your session. It forces an extra verification step, usually through an app or device, making it much harder for someone else to act as you inside Copilot or other Microsoft services.

    5) Reduce how much personal data exists online

    Data broker sites collect and resell personal details like your email address, phone number, home address and even work history. If an AI tool or account session is abused, that publicly available data can make the damage worse. Using a data-removal service helps delete this information from broker databases, shrinking your digital footprint and limiting what attackers can piece together.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Run strong antivirus software on your device

    Modern antivirus tools do more than scan files. They help detect phishing links, malicious scripts and suspicious behavior tied to browser activity. Since Reprompt-style attacks start with a single click, having real-time protection can stop you before damage happens, especially when attacks look legitimate.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Regularly review your account activity and settings

    Check your Microsoft account activity for unfamiliar logins, locations, or actions. Review what services Copilot can access, and revoke anything you no longer need. These checks don’t take long, but they can reveal issues early, before attackers have time to do serious damage. Here’s how:

    Go to account.microsoft.com, and sign in to your Microsoft account.

    Select Security, then choose View my sign-in activity and verify your identity if prompted.

    Review each login for unfamiliar locations, devices or failed sign-in attempts.

    If you see anything suspicious, select This wasn’t me or Secure your account, then change your password immediately and enable two-step verification.

    Visit account.microsoft.com/devices, and remove any devices you no longer recognize or use.

    In Microsoft Edge, open Settings > Appearance > Copilot and Sidebar > Copilot, and turn off Allow Microsoft to access page content if you want to limit Copilot’s access.

    Review apps connected to your Microsoft account and revoke permissions you no longer need.

    close up of hands of business person working on computer, man using internet and social media

    A single Copilot link can carry hidden instructions that run the moment you click, without any warning or pop-ups.  (iStock)

    8) Be specific about what you ask AI tools to do

    Avoid giving AI assistants broad authority like “handle whatever is needed.” Wide permissions make it easier for hidden instructions to influence outcomes. Keep requests narrow and task-focused. The less freedom an AI has, the harder it is for malicious prompts to steer it silently.

    Kurt’s key takeaway

    Reprompt doesn’t mean Copilot is unsafe to use, but it does show how much trust these tools require. When an AI assistant can think, remember and act for you, even a single bad click can matter. Keeping your system updated and being selective about what you click remain just as important in the age of AI as it was before.

    Do you feel comfortable letting AI assistants access your personal data, or does this make you more cautious? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • Jana Duggar Welcomes First Child; Reveals Very Royal Name!

    [ad_1]

    Reading Time: 2 minutes

    It’s a boy for Jana Duggar and Stephen Wissmann!

    Yes, the happy couple took to Instagram this week to reveal that Jana has welcomed her first child.

    In the past, all Duggar births were announced as soon as possible, but Jana has always moved at her own pace, so it’s no surprise that she waited a few weeks to share the news:

    Jana Duggar and Stephen Wissmann.
    An excited Jana Duggar and Stephen Wissmann have welcomed a son! (Image Credit: YouTube)

    “We took some time to settle into our new rhythm before sharing this sweet news,” the former reality star wrote on Instagram.

    “Archie Gerald Wissmann arrived on December 30, 2025, and our hearts have been completely changed. We’re soaking in these early days, full of love, wonder and so much gratitude.”

    Yes, Jana’s baby boy has been christened Archie.

    She didn’t divulge the inspiration for that name, but in the comments, many fans noted that the bundle of joy shares a name with Prince Harry and Meghan Markle’s son.

    We never got the impression that Jana was a fan of royal gossip, so if we had to guess, we would say she’s not paying homage to the Sussexes. But who knows?

    Anyway, if you’re keeping score at home (no easy feat!). this brings Jim Bob and Michelle Duggar’s total number of grandchildren to 40!

    Several members of Jana’s famous family were quick to gush about the family’s newest addition.

    “Ahhh we love Archie so much already and can’t wait to meet him!!” Jinger Duggar commented on the post.

    “He’s perfect!!!!” Jessa Duggar enthused.

    “Ah! He’s so cute! Can’t wait to meet him! Congratulations y’all!” Jill Duggar chimed in.

    Yes, the Duggars are a far-flung clan these days, with siblings residing in multiple states.

    Jana Duggar tried on a shoulder-baring dress ahead of her wedding.Jana Duggar tried on a shoulder-baring dress ahead of her wedding.
    Jana Duggar tried on a shoulder-baring dress ahead of her wedding. (YouTube)

    Jana and Stephen moved to Nebraska shortly after tying the knot, and while we’re sure Jana occasionally misses her massive family, she seems to have no regrets.

    “It’s great,” she recently told People of her new living situation.

    “We’ve been working, he has a little house we bought that we’ve been fixing up and getting pulled together, and so that’s been fun.”

    There was a time when it looked as though Jana might choose to remain single for life.

    She was derisively dubbed “the Cinderella Duggar,” as she seemed to be constantly burdened by household chores, all while her younger siblings “courted,” married, and started families of their own.

    There were even rumors that Jana was forbidden to marry and had vowed to remain at home to help with the raising of her brothers and sisters.

    Thankfully, that turned out not to be the case. Fans were overjoyed when Jana announced her engagement to Stephen, and we’re sure they’re even more thrilled today.

    Our sincere congratulations go out to the happy couple!

    [ad_2]

    Tyler Johnson

    Source link

  • PayPal Acquires Cymbio for Agentic Commerce Capabilities – Finovate

    [ad_1]

    • PayPal has acquired Cymbio to accelerate its push into agentic commerce, adding marketplace and drop-ship automation capabilities that help merchants sell across AI-driven channels like Microsoft Copilot and Perplexity.
    • The deal builds on an existing partnership between the two players, which first teamed up in October 2025.
    • The acquisition reinforces PayPal’s broader ambitions in agentic commerce.

    PayPal just acquired drop-ship and marketplace automation platform Cymbio for an undisclosed amount. The move fits with PayPal’s push into agentic commerce, as Cymbio’s payment orchestration platform helps brands sell across agentic channels, including Microsoft Copilot and Perplexity.

    Financial terms of the deal, which is expected to close later this year, were undisclosed.

    PayPal’s acquisition comes three months after PayPal first partnered with Cymbio to launch agentic commerce services, a suite of solutions to help merchants attract customers in an AI-powered commerce environment.

    “PayPal has established itself as a leading commerce partner for merchants looking to sell within top AI platforms,” said PayPal Executive Vice President and General Manager of Small Business and Financial Services Michelle Gill. “Acquiring Cymbio’s technology and team will enhance our agentic commerce capabilities and accelerate the expansion to more of our merchants. By making their product catalogs discoverable on AI surfaces, merchants can increase sales while expanding product choice to the millions of consumers shopping on AI platforms today.”

    Cymbio was founded in 2015 and is headquartered in Tel Aviv. The company’s marketplace and social commerce automation platform facilitates collaboration between brands and retailers by automating processes such as product listing, inventory management, pricing, order fulfillment, and returns. Cymbio connects to 800 brands’ and retailers’ internal systems to enable strong collaborations that can be scaled quickly. The company has raised $35 million from investors including PayPal Ventures, and counts Balmain, Reebok, Abercrombie & Fitch, New Balance, Steve Madden, and Fabletics among its customers.

    Once the deal is finalized, PayPal will use Cymbio to power Store Sync, one of PayPal’s agentic commerce services that allows merchants’ product data to be discoverable within AI channels. Store Sync drops orders to merchants’ existing fulfillment and management systems. The system allows the merchant to remain the merchant of record and retain customer relationships and control over their brand.

    As a pioneer in fintech, PayPal is seeking to be an early mover in agentic commerce as well. In late 2025, the company rolled out agentic commerce services to help merchants connect product catalogs and checkout experiences to AI platforms like Perplexity. PayPal has also collaborated with AI ecosystem partners such as OpenAI to support instant checkout via the Agentic Commerce Protocol. It is clear that the company is seeking a top spot in the agentic commerce battlefield.


    Photo by Julio Lopez

    Views: 74

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link

  • Finovate Global Europe: Competition, Profitability, and a Reckoning Year for Regulation – Finovate

    [ad_1]

    Last week, Finovate Global looked at how key trends are shaping fintech innovation in the UK. This week, our Friday column crosses the channel to consider the most significant forces shaping fintech innovation on the Continent, especially among advanced industrial economies in the West and Baltic north.

    In our examination of the UK, we highlighted navigating regulatory complexity, accelerating technological transformation, and meeting rising customer expectations as three key issues facing banks and financial services providers there. These issues are also important to markets in the advanced markets of Europe. However, there are additional themes that distinguish the concerns of bankers in developed Europe from their colleagues in both the UK and the US.


    Profitability and Competitiveness in the Shadow of NIRP

    One of the challenges that European banks are still dealing with is the legacy of negative interest rates. Just as the US economy was emerging from its post-Global Financial Crisis (GFC)-initiated ZIRP or zero interest rate policy, the EU was plunging into what would be a seven-year experiment in negative interest rates (NIRP). A response to the threat of deflation in the wake of the Global Financial Crisis and, more acutely, the sovereign debt crisis of 2010-2012, the EU’s NIRP policy lasted longer and was more extreme, with rates falling to -0.50%.

    The impact on EU banks has been significant. Even as interest rates have normalized since NIRP ended in 2022, net interest income for EU banks has remained squeezed, impeding profitability. Additionally, European banks suffer from structural challenges to greater profitability that extend beyond the legacy of NIRP. Among them is one fundamental issue: there are a lot of banks in Europe, arguably too many, all chasing too few customers. Considered on a per capita basis, countries such as Germany, Austria, Switzerland, and Italy have a very large number of banks and similar financial institutions relative to their populations. By comparison, the UK is significantly less “bank dense,” and even the US, which is often accused of having “too many banks,” is considered only moderately bank dense.

    Along with excess capacity, issues of market fragmentation and high cost-to-income ratios all contribute to an environment in which achieving profitability as an EU bank remains a challenge. Banks struggling to make money often hesitate to make the necessary investments in technology that can help them reach new customers, access new markets, and offer new products and services.


    A More Integrated Union? Overcoming Fragmentation to Enable Innovation

    Both the EU and UK face challenges when it comes to digital transformation. But the differences between the two regions are significant and in some ways related to the issues of market fragmentation that plague EU bank profitability. When it comes to digital transformation and investing in technology, fragmentation and diversity between member states make the task more difficult and more expensive. Larger EU banks often have country- and product-specific legacy cores—sometimes even different cores built in multiple decades. These legacy cores not only fail to communicate well with each other, but also often exist in increasingly outdated mainframe environments. On the other hand, smaller banks and financial institutions in the EU often simply can’t afford major core replacements.

    Uneven development and country-specific challenges often hold back fintech innovation in the EU. Even where the EU has effectively encouraged innovation, such as PSD2, which mandated open banking, adoption and implementation has varied widely by country. While open banking adoption rates in parts of Europe, such as the Baltics, are exceptional, many other countries, including Western European countries like France, Germany, and Spain, have had more modest rates of implementation. In this context, it will be interesting to see how the different countries embrace Wero, the new pan-European instant payments and wallet scheme currently being introduced throughout the EU. Here, countries like France, Germany, and Belgium are experiencing strong implementation and user adoption trends, while others, including Spain, Italy, and Switzerland are lagging.

    How are some of the other enabling innovations—such as AI and DeFi—shaping banking and financial services in Western Europe? The European Banking Authority characterizes adoption of AI in its industry as “widespread but cautious.” Unsurprisingly, use cases in customer service are the most common, as is the use of AI to help in AML/CFT screening. In addition to customer service, streamlining internal workflows is another popular use case for AI among EU banks. Generally speaking, the larger markets of the EU—Germany, France, the Nordics—are experiencing the most robust use of AI in banking and financial services.

    The story is similar with DeFi and blockchain technology adoption in banking: the larger countries tend to have more banks engaged in activities such as digital asset custody services, tokenization, and trade finance. One especially interesting development is the pursuit of a euro stablecoin, an effort led by a consortium of EU banks including ING, UniCredit, and SEB that is expected to lead to a MiCA-compliant euro stablecoin launch later this year.


    A Regulatory Year of Reckoning for Payments, Crypto, and AI in the EU

    There is a variety of regulatory events coming this year. Some of them are the latest chapters in policies that were enacted last year, while others will make their compliance debut here in 2026. With regard to the former, regulations such as DORA (Digital Operational Resilience Regulation) which was passed in 2025 and deals with ICT, third-party, and operational risk, will continue to have an impact as institutions look to ensure compliance with resilience requirements for governance, testing, and incident reporting. Elements of the Basel III reforms, initially designed to help fortify banks in the wake of the Global Financial Crisis, have been postponed from scheduled implementation this year to 2027. Speaking of postponements, another significant regulation, the Enhanced Operational Risk Reporting Deadline, has been moved forward to June of this year.

    Other key regulatory developments to anticipate for EU banks and financial services providers include the rollout of new payment regulations including PSD3, which focuses on licensing and institutional requirements, and PSR (Payment Services Regulation), which deals with day-to-day operational issues. PSD3, in particular, will be an important mandate insofar as it seeks to correct a number of problems with the previous open banking directive, PSD2. PSD3 features significant guidelines and requirements with regard to fraud prevention and liability, and also paves the way for open finance.

    What about the enabling technologies highlighted in the previous section? With regard to DeFi and crypto, the Markets in Crypto-Assets Regulation (MiCA) comes fully into effect in 2026. Among the requirements are that cryptocurrency firms must have MiCA licenses to operate by the middle of the year. While this will address centralized service providers (CASPs) in the DeFi market, it does not specifically define the parameters of DeFi, including what services should be subject to MiCA. This conversation will be key for EU policy-makers in 2026.

    As for AI, 2026 will be a big year, as well. Enacted in 2024, the EU AI Act will require AI systems designated as “high risk” to adhere to new guidelines with regards to creditworthiness, loan origination, risk evaluation, and automated decisioning. Additionally, the Act will require these systems to use strong governance, risk management documentation, transparency, human oversight, and quality control. Note that the Act categorizes AI systems by risk: minimal/no risk, which is virtually unregulated; limited risk, where compliance consists largely of transparency obligations; high risk, which is strictly regulated; and banned AI, which includes capabilities such as social scoring by governments and real-time remote biometric identification. Another key development is the launch of national AI regulatory sandboxes in each EU member state by August of this year, as mandated by the Act. Here, both Denmark and Spain have been credited as being ahead of the game in terms of getting these initiatives underway.


    Here is our look at fintech innovation around the world.

    Asia-Pacific

    • Singapore-based Airwallex acquired Paynuri in bid to enter the South Korean market.
    • Indonesian fintech UangCermat raised $26.4 million in a combination of equity and credit facilities.
    • Vietnam announced that crypto firms that want to participate in the country’s pilot digital asset market will need a minimum capitalization of VND 10 trillion ($400 million).

    Sub-Saharan Africa

    • Payment software firm Akurateco forged a strategic partnership with African digital payments service provider Payaza.
    • Two South African fintechs—Johannesburg’s RelyComply and Cape Town’s Ozow—teamed up to enhance security for digital payments in the country.
    • The Africa Report profiled SycaPay, the first fintech to be licensed by the Central Bank of West African States (BCEAO).

    Central and Eastern Europe

    • German KYB/KYC lifecycle management platform Sinpex raised €10 million in Series A financing.
    • Greece-based Epirus Bank teamed up with NCR Atleos to modernize and expand its ATM network.
    • Berlin-based climate fintech Cloover secured a $1.2 billion debt facility and raised $22 million in Series A funding.

    Middle East and Northern Africa

    • PayPal acquired Israel-based agentic commerce innovator Cymbio.
    • Financial infrastructure and payment solutions provider Montran opened a new office in Dubai.
    • Saudi Arabia’s EdfaPay, a payment infrastructure solutions company, secured approval to launch SmartPOS service in the Kingdom.

    Central and Southern Asia

    • Indian digital payments giant PhonePe secured approval from the country’s financial regulator to launch an IPO, slated for mid-2026.
    • Pakistan-based fintech Neem raised an undisclosed sum in Pre-Series A funding in a round that featured participation from Epic Angels, the largest all-female investment collective in the world.
    • Kazakhstan enacted a range of new laws to regulate digital assets and to allow banks to expand into fintech, AI, and digital payments infrastructure.

    Latin America and the Caribbean

    • Uruguayan cross-border payment platform dLocal teamed up with international AI device ecosystem company HONOR to launch local payments in Peru.
    • Cryptocurrency exchange Bybit launched Bybit Pay in Peru via integrations with the country’s Yape and Plin digital payment platforms.
    • UK-based stablecoin infrastructure company Noah partnered with Brazil-based digital wallet and investment platform Picnic.

    Photo by Marco

    Views: 194

    [ad_2]

    David Penn

    Source link

  • Ransomware attack exposes Social Security numbers at major gas station chain

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals are happy to target almost any industry where data can be stolen. In many cases, less prepared and less security-focused companies are simply easier targets. 

    A recent ransomware attack on a company tied to dozens of gas stations across Texas shows exactly how this plays out. The incident exposed highly sensitive personal data, including Social Security numbers and driver’s license details, belonging to hundreds of thousands of people. 

    The breach went undetected for days, giving attackers ample time to move through internal systems and steal sensitive data. If you’ve ever paid at the pump or shopped inside one of these convenience stores, this is the kind of incident that should make you stop and pay attention.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    What happened in the Gulshan ransomware attack

    According to a disclosure filed with the Maine Attorney General’s Office, Gulshan Management Services, Inc. reported a cybersecurity incident that impacted more than 377,000 individuals. Gulshan is linked to Gulshan Enterprises, which operates around 150 Handi Plus and Handi Stop gas stations and convenience stores across Texas.

    WINDOWS 10 USERS FACE RANSOMWARE NIGHTMARE AS MICROSOFT SUPPORT ENDS IN 2025 WORLDWIDE

    The company says it detected unauthorized access to its IT systems in late September. Investigators later determined that attackers had been inside the network for roughly ten days before anyone noticed. The intrusion began with a phishing attack, a reminder of how a single deceptive email can still open the door to massive breaches.

    Ransomware attacks don’t just hit tech companies. Retailers like gas stations store sensitive customer and employee data that criminals actively target. (Kurt “CyberGuy” Knutsson)

    During that window, the attackers accessed and stole personal data, then deployed ransomware that encrypted files across Gulshan’s systems. The compromised information includes names, contact details, Social Security numbers and driver’s license numbers. That combination is especially dangerous, since it can be used for identity theft, account takeovers and fraud that may surface months or even years later.

    Why the lack of a ransomware claim still matters

    So far, no known ransomware group has publicly taken credit for the attack. That might sound like good news, but it does not necessarily change the risk for affected individuals. In many ransomware cases, silence can mean one of two things. Either the attackers have not yet posted stolen data publicly, or the victim company may have resolved the incident privately.

    Gulshan’s filing states that it restored its systems using known-safe backups. That detail often suggests a company chose to rebuild rather than negotiate with attackers. Even so, once data has been copied out of a network, there is no way to pull it back. Whether or not the stolen information ever appears online, the exposure alone puts affected people at long-term risk.

    This incident also highlights a recurring pattern. Retail and service businesses handle huge volumes of personal data but often rely on legacy systems and frontline employees who are prime phishing targets. Gas stations may not feel like obvious hacking targets, but their payment systems, loyalty programs and HR databases make them valuable all the same.

    We reached out to Gulshan Management Services for comment regarding the breach, but did not receive a response before our deadline.

    Texas gas station customer

    A customer pumps gas at a gas station on Feb. 13, 2025, in Austin, Texas.  (Brandon Bell/Getty Images)

    10 steps you can take to protect yourself after a breach like this

    If your information was exposed in this breach or any similar ransomware incident, there are concrete steps you can take to reduce the fallout.

    1) Monitor your credit and identity closely

    If the company offers free credit monitoring or identity protection, enroll in it. These services can alert you early if someone tries to open accounts or misuse your identity. If nothing is offered, consider signing up for a reputable identity theft protection service on your own.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    2) Consider a personal data removal service

    The less of your information that’s floating around data broker sites, the harder it is for criminals to target you. Data removal services can help reduce your digital footprint over time.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Frontier fallout as 750K customers' data exposed in RansomHub cyberattack

    Even when no ransomware group claims responsibility, stolen data can still fuel identity theft, fraud, and account takeovers long after a breach occurs. (Kurt “CyberGuy” Knutsson)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    3) Use a password manager

    A password manager helps you create and store unique passwords for every account. If attackers try to reuse stolen data to break into your online accounts, strong, unique passwords can stop that attempt cold.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    4) Turn on two-factor authentication (2FA) everywhere possible

    2FA adds an extra barrier, even if someone has your personal details. Prioritize email, banking, cloud storage, and shopping accounts, since those are often targeted first.

    5) Install and keep a strong antivirus software running

    Strong antivirus software can help detect phishing attempts, malicious downloads, and suspicious activity before it turns into a full compromise. Keep real-time protection enabled and don’t ignore warnings.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Watch for phishing and follow-up scams

    After breaches like this, scammers often send fake emails or texts pretending to be the affected company or a credit monitoring service. Slow down, verify messages independently, and never click links you weren’t expecting.

    7) Review your credit reports regularly

    Check your reports from all major credit bureaus for unfamiliar accounts or inquiries. You’re entitled to free reports, and catching issues early makes them much easier to fix.

    8) Freeze your credit to stop new accounts from being opened

    If criminals expose your Social Security number, place a credit freeze as soon as possible. A credit freeze blocks lenders from opening new accounts in your name, even when thieves have your personal details. The credit bureaus offer freezes for free, and you can temporarily lift one when you apply for credit yourself. This step stops identity theft before it starts, instead of alerting you after the damage is done. If you prefer not to freeze your credit, place a fraud alert instead. A fraud alert tells lenders to verify your identity before approving credit, which adds another layer of protection.

    To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    Person using their smartphone.

    In the Gulshan attack, hackers spent days inside internal systems, stealing personal data before deploying ransomware that locked down files. (Silas Stein/picture alliance via Getty Images)

    9) Protect yourself from tax refund fraud with an IRS Identity Protection PIN

    When Social Security numbers are stolen, tax fraud often follows. Criminals can file fake tax returns in your name to steal refunds before you ever submit your paperwork. An IRS Identity Protection PIN (IP PIN) helps prevent this by ensuring only you can file a tax return using your SSN. It’s a simple but powerful safeguard that can block a common form of identity theft tied to data breaches.

    10) Lock down existing bank and financial accounts

    Don’t just watch for new fraud, proactively secure the accounts you already have. Enable alerts on bank and credit card accounts for large transactions, new payees, or changes to contact information. If your SSN or driver’s license number was exposed, consider calling your bank to ask about additional protections or account notes. Acting early can prevent small issues from becoming major financial problems.

    Kurt’s key takeaway

    Your personal data doesn’t just live with banks and hospitals. Retailers, gas stations, and convenience store operators also hold information that can cause real harm if it falls into the wrong hands. When attackers get in through something as simple as a phishing email and stay undetected for days, the damage can spread fast. You can’t prevent these breaches yourself, but you can limit how much power stolen data gives criminals by locking down your accounts and staying alert.

    Do you think everyday businesses like gas stations take cybersecurity seriously enough? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • OnePay Expands Klarna Partnership with Post-Purchase Payments – Finovate

    [ad_1]

    • OnePay is expanding its partnership with Klarna to launch Swipe to Finance, a feature that will enable eligible customers to convert debit card purchases into post-transaction installment payment plans.
    • Specific details of the terms around post-purchase financing have not been disclosed, but the feature will position OnePay alongside players like PayPal and Affirm by offering flexible repayment options beyond the point of sale.
    • Swipe to Finance strengthens OnePay’s push to compete with digital banks such as Chime and Dave, adding to its growing suite of banking, payments, investing, and crypto tools backed by Walmart’s scale and embedded distribution.

    Walmart-owned digital banking platform OnePay is deepening its ties with BNPL player Klarna to launch Swipe to Finance, a new feature that will offer customers the option to pay over time even after they’ve made the transaction.

    “Not every purchase comes at the right time,” said Thomas Hoare, Chief Commercial Officer at OnePay. “Customers want and deserve financial flexibility when they need it most, which is why we’re excited to offer new ways for them to pay over time and do it simply, transparently, and all in the OnePay app.”

    After making a purchase with a OnePay debit card, eligible customers can use the OnePay app to convert transactions into fixed-term payment plans. While the company has not disclosed details about launch timing, eligible purchases, or available plan options, OnePay’s post-purchase financing may resemble models offered by PayPal and Affirm, which allow users to either pay in four installments or spread payments over longer repayment periods ranging from three to 36 months.

    “Post-purchase payments are becoming a core part of how people manage money,” said David Sykes, Chief Commercial Officer at Klarna. “With Swipe to Finance powered by Klarna, we’re giving customers a simple, transparent way to take control of payments after the fact, directly in the OnePay app. It’s another step in expanding smarter payment options and meeting consumers wherever they choose to pay.”

    This week’s Swipe to Finance announcement comes about 10 months after OnePay and Klarna first teamed up to offer BNPL options at the point of sale for consumers. The company hinted at plans to deepen ties with Klarna even further, stating, “Additional products and features are planned for later this year that expand OnePay’s types of flexible payment options and can reach new customers.”

    Today’s announcement comes at a time of major growth for OnePay, which is seeking to compete with well entrenched digital banks such as Chime and Dave. Last fall, the company partnered with DriveWealth to offer embedded investing tools and teamed up with Zero Hash to facilitate bitcoin and ether trading within its app. In addition to these new capabilities, the OnePay app also offers traditional banking tools such as a high-yield savings account, peer-to-peer money transfer capabilities, and cross-border payments. However, the app also differentiates itself from traditional banks and even other digital banks with a credit builder card, tax filing service, and even a low-cost mobile phone plan via a partnership with Gigs.

    OnePay is seeking to compete with entrenched digital banking players such as Chime and Dave. The company is well positioned to do so thanks to its second-mover advantages and embedded distribution through its parent company, Walmart, which launched OnePay in January 2021 in partnership with Ribbit Capital. In January 2022, Walmart expanded OnePay’s capabilities by acquiring two fintech platforms, Even and ONE, which helped Walmart create its version of a financial services super app.

    For more on Walmart’s fintech ambitions, which started in 2005 when it applied for a Utah Industrial Loan Corporation (ILC) charter, check out my deep dive conversation on the One Vision podcast with host Theodora Lau.

    Views: 66

    [ad_2]

    Julie Muhn (@julieschicktanz)

    Source link