The dramatic changes of 2020 underscore the impact of phishing attacks such as Business Email Compromise (BEC) on businesses and consumers world-wide.
The Agari Cyber Intelligence Division analyzed trillions of emails and nearly 500 million Internet domains to uncover the scope and impact of this email fraud… and...
Email—despite its importance, ubiquity, and staying power—has never been secure. Prior attempts at security have failed to solve email’s fundamental flaw—anyone can send email using someone else’s identity. This flaw has put the power of the world’s most admired brands in the hands of cybercriminals....
Ransomware attacks have been a reality for organizations of all sizes for quite
some time. In recent months, however, the volume and sophistication of attacks,
as well as the consequences, have been ratcheting up.
This whitepaper examines ten strategies that can reduce risk, build resilience, and help get...
CoinMarketCap says it has found no evidence of a data beach despite the circulation of a list of 3.1 million email addresses that correlates with accounts on its service. Regardless of the source, the list would be useful for attackers to launch phishing attacks against those interested in cryptocurrency.
Yes, you know they are coming. And yes, the fraudsters have raised their game. But that doesn't mean you can't stop socially engineered attacks before threat actors can pull off their scams. Mike Britton of Abnormal Security tells you how.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including why enterprises need a multilayered approach to securing identity, how fraud will evolve in 2022 and the need to secure backdoors to prevent ransomware attacks.
The scary fact is that human error is a contributing factor in more than 90% of breaches, and even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses. With so many technical controls in place hackers are still getting through to your end users, making them your last...
Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which today’s determined hackers can exploit at will. There’s even a term for it: Assume Breach.
But assuming you’ll be hacked isn’t an option for you. Your organization can’t afford a loss of...
The latest edition of the ISMG Security Report features an analysis of the most sought-after type of victim for ransomware-wielding attackers. Also featured: fighting extortion schemes and stress management tips.
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Javvad Malik, Security Awareness Advocate for KnowBe4, as he provides...
Business email compromise attacks, which balance low-tech tactics with the potential for big profits, remain popular. Attackers continue to refine their tactics, including subverting legitimate redirect services as well as recruiting English-speaking business partners and cryptocurrency tumbler operators.
O365 has become the standard productivity platform, with the largest market share of users leveraging Microsoft's email, voice, file sharing applications, and all collaboration and productivity tools everyone uses and loves!
This movement is definitely fueled by the move to the Cloud and SaaS application consumption,...
Europol says it used a sting operation to derail an organized crime group that waged an email fraud campaign that stole about 1 million euros ($1.1 million).
As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.