Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The losses and potential losses reported as a result of business email compromise (BEC) and email account compromise (EAC) scams exceed over $12 billion globally, says the FBI [Read More]
The Necurs botnet has started using Internet Query (IQY) files in recent waves of spam attacks, in an attempt to thwart security protections. [Read More]
Cybercriminals use a technique dubbed by researchers ZeroFont to bypass Office 365 phishing protections [Read More]
Non-Russian threat group targets service centers in Russia in multi-stage attacks involving spear phishing and malicious documents [Read More]
Recent attacks launched by the Russian cyber espionage group Sofacy on foreign affairs entities in North America and Central Asia show the hackers have changed their tactics [Read More]
Phishing attacks carried out via text messages that use the “Punycode” technique to make nefarious URLs look legitimate are becoming more popular, cloud security firm Zscaler says. [Read More]
Agari researchers developed a method of gaining access to the scammers' own mailboxes, using what he describes as responsible active defense. [Read More]
A dataset allegedly containing 200 million unique sets of personally identifiable information (PII) exfiltrated from several popular Japanese website databases emerged on underground forums [Read More]
A threat group tracked by Dragos as ‘Allanite’ has been targeting business and ICS networks at electric utilities in the US and UK [Read More]
Researchers discover that cybercriminals have been using a new method to bypass the Safe Links security feature in Office 365. Microsoft is investigating [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.