Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The FBI this week issued an alert to warn the public of spoofed FBI-related Internet domains. [Read More]
A Russian-speaking threat actor has been targeting hundreds of industrial enterprises for more than two years, their main goal being to steal money. [Read More]
A threat actor specializing in business email compromise (BEC) attacks has been spotted exploiting a vulnerability to spoof the domains of Rackspace customers. [Read More]
JM Bullion has informed some customers that their payment card information may have been stolen by hackers, but the disclosure came months after the breach was discovered. [Read More]
A database with information on virtually the entire US voting population has been circulated on hacker forums, opening up the potential for disinformation and scams. [Read More]
Google says its Threat Analysis Group (TAG) hasn’t observed any significant coordinated influence campaigns that are targeting United States voters on its platform. [Read More]
Law enforcement agencies in 16 countries worked together to dismantle a criminal network involved in the laundering of money from high-level cybercriminals. [Read More]
Organizations using the Playback Now conference platform have been targeted by cybercriminals with a payment card skimmer. [Read More]
Hack-for-hire group BAHAMUT managed to build a fake online empire to leverage in cyber-espionage operations targeting the Middle East and other regions around the world. [Read More]
Hackers associated with the “Fullz House” group have compromised the website of Boom! Mobile and planted a web skimmer. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.