Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The open-source browser cracks down on cross-site tracking by isolating network connections and caches to the website currently visited. [Read More]
Apple confirmed that malicious hackers are exploiting serious security flaws in its flagship iOS and iPad OS platforms. Details are scant. [Read More]
Google warned about a “government-backed entity based in North Korea” targeting security researchers with social engineering attacks and drive-by browser exploits from booby-trapped websites. [Read More]
A new phishing campaign delivering fake Office 365 password expiration reports has managed to compromise tens of C-Suite email accounts, Trend Micro warns. [Read More]
With Microsoft Edge 88.0.705.50, users get a built-in strong password generator that allows them to easily set up new passwords when signing up for new accounts or when changing the old passwords. [Read More]
A misconfiguration resulted in more than 1,000 stolen corporate credentials exposed in plain sight. [Read More]
The multi-stage, tag-based malicious ad campaign is heavily obfuscated and employs clever tricks to avoid detection. [Read More]
In one attack, the cybercriminals found an employee via the company’s chatroom and then convinced them to log into a fake VPN page to reveal their credentials. [Read More]
Going after high profile victims appears to have allowed Ryuk ransomware operators to build a highly lucrative malware enterprise. [Read More]
The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.