Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A financially motivated threat actor believed to speak Russian has used remote access Trojans (RATs) in attacks on financial entities in the United States and worldwide. [Read More]
Most of the malicious activity by Brazilian hackers is within Brazil against Brazilians, but this does not mean that Brazil lacks hacking capabilities, nor that the rest of the world can ignore Brazilian hackers. [Read More]
Microsoft has taken control of 99 domains used by an Iran-linked cyberespionage group tracked as Phosphorus, APT35, Charming Kitten, NewsBeef, Newscaster and Ajax Security Team. [Read More]
A 50-year-old from Lithuania has pleaded guilty over his role in a $100 million business email compromise (BEC) scheme targeting Facebook and Google. [Read More]
Threat actors have been increasingly targeting Office 365 and G Suite cloud accounts that are using the legacy IMAP protocol in an attempt to bypass multi-factor authentication (MFA). [Read More]
Former Air Force intelligence officer, Monica Elfriede Witt, has been charged with providing secret U.S. information to the Iranian government. [Read More]
A recent phishing attack targeting mobile users leveraged Google Translate to serve fake login pages to Google and Facebook users. [Read More]
Netcraft launches mobile app designed to protect users against phishing and other attacks. Android version available and iOS version coming soon. [Read More]
Alphabet’s Jigsaw unit has published a quiz that tests users’ ability to identify phishing attacks and teaches them what signs to look for to determine if a message is legitimate or not. [Read More]
A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims’ inboxes. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Jon-Louis Heimerl's picture
What do you do when your organization has been victimized by a phishing attack? If you wait until you are actually under an attack it is too late.
Jon-Louis Heimerl's picture
Organizationally, there are things you can do to help avoid becoming a victim, and to minimize damage if you are victimized.