Remove Compromise Remove Email Compromise Remove Request for Payment
article thumbnail

Corporates Brace For BEC Scam Ramp-Up

PYMNTS

Cybersecurity experts are warning that the next year, and beyond, will continue to present an elevated threat level to businesses at risk of payments fraud — and governments are taking steps to react accordingly. Hassold provided a public comment on the vendor email compromise scam. Meanwhile, in the U.K.,

article thumbnail

The B2B Payments Fraud Threat Of Internal Employees

PYMNTS

That means the vast majority of businesses are at risk for an array of cybersecurity incidents, including the Business Email Compromise (BEC), which often sees fraudsters spoofing legitimate email addresses from vendors, and sending seemingly real requests for payment.

B2B 89
article thumbnail

FBI Pinpoints ‘Ground Zero’ For Supplier Email Scams

PYMNTS

The Federal Bureau of Investigation has been targeting the Business Email Compromise for years, warning companies to be aware of fake supplier emails and invoices requesting firms to wire funds. billion from unsuspecting companies. According to reports, funds wired are rarely recovered.

FBI 40
article thumbnail

India Topples B2B Invoice Scam

PYMNTS

The majority of businesses are at risk for an array of cybersecurity incidents, including the business email compromise (BEC) scam, which often sees fraudsters spoofing legitimate email addresses from vendors, and sending seemingly real requests for payment. .

Scams 52
article thumbnail

Business Email Scams’ Latest Target: Art Galleries

PYMNTS

Scammers deploying the Business Email Compromise (BEC) scam have proven no company, regardless of size and industry, is immune to this crime. According to the publication, scammers using the BEC, in which a fake invoice is sent to a company with request for payment, have stolen “large sums of money” from art galleries in the U.K.

Scams 43
article thumbnail

When Email Becomes SMBs’ Biggest Security Threat

PYMNTS

The business email compromise (BEC) scam is a cybersecurity threat to businesses of all sizes, and the financial and security implications of a successful attack aren’t isolated to its target. Attackers also turn to developing fraudulent portals to compromise professionals’ email credentials, for example.

article thumbnail

Procurement Is Ground Zero For Cybersecurity Protection

PYMNTS

For some, like small suppliers, a compromise of sensitive data and credentials can lead to a few hundred or thousand dollars fraudulently obtained from a business client, often via the Business Email Compromise scam. The impact from a data breach on an enterprise can be a mixed bag. 2013, resulting in $3.1