According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to harvest unique identifiers from millions of mobile devices. [Read More]
Mimecast learned from Microsoft that one of its certificates was compromised by sophisticated threat actors, but the email security firm says impact is limited. [Read More]
Trend Micro warns that a previously unknown threat actor is targeting multiple organizations, including government entities, research institutions, and universities in Taiwan. [Read More]
The combined entity offers more than a half-dozen security solutions for data security risk detection and cyber-attack protection, response, and recovery. [Read More]
A researcher earned over $13,000 from Facebook for a flaw that exposed the email address and birth date of Instagram users via the Facebook Business Suite. [Read More]
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”