MEDIUMVulnerability
Global

MoneyHash strengthens presence in Bahrain witth EazyPay relationship

Tuesday, April 7, 2026 at 04:31 PM UTC·Source: Finextra

Updated: Tuesday, April 7, 2026 at 03:34 PM UTC

Executive Summary

MoneyHash, the leading payment orchestration platform in emerging and global markets, announced a new partnership with Eazy Financial Services (EazyPay), a Central Bank of Bahrain-licensed payment service provider and acquirer supporting businesses across the Kingdom of Bahrain and strengthening access to payment gateways in Bahrain for regional and global merchants.

Analysis

MoneyHash, the leading payment orchestration platform in emerging and global markets, announced a new partnership with Eazy Financial Services (EazyPay), a Central Bank of Bahrain-licensed payment service provider and acquirer supporting businesses across the Kingdom of Bahrain and strengthening access to payment gateways in Bahrain for regional and global merchants.
Source Attribution

Originally published by Finextra on Apr 7, 2026.

Related Threats

CRITICALVulnerabilityNEW

Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities

The program comes as the tech industry races to secure software before similar AI-powered offensive capabilities become too much for defenders to handle. The post Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities appeared first on CyberScoop .

CyberScoop
LOWVulnerabilityNEW

Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn

Iranian government hackers are launching disruptive cyberattacks on American energy and water infrastructure, U.S. government agencies “urgently” warned Tuesday. The hackers are taking aim at devices and systems that control industrial processes, and have harmed victims in the last month following the onset of U.S.-Israel strikes against Iran, according to the joint alert from the […] The po

CyberScoop
CRITICALVulnerabilityNEW

NVD CRITICAL: CVE-2026-4631 — Cockpit's remote login feature passes user-supplied hostnames and usernames from...

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The inje

CVE-2026-4631
NIST NVD