Email is the most widely used business application—and the No. 1 vector of cyberattacks. For Microsoft’s enormous installed base of
Microsoft 365 Exchange email users, the cyber threat is particularly acute. This paper explores the security challenges facing organizations
that rely on Microsoft 365 for email and...
Security and IT organizations must protect against new attacks at scale — and safeguard data in
use, at rest and in motion — in radically cloud-centered environments where perimeters are
fading as quickly as the distinctions between work and home. To do so, they need to leverage more
In a growing trend known as credential phishing, threat actors impersonate legitimate brands and services by crafting similar-looking websites where unsuspecting users enter their account information.
To uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake...
Email—despite its importance, ubiquity, and staying power—has never been secure. Prior attempts at security have failed to solve email’s fundamental flaw—anyone can send email using someone else’s identity. This flaw has put the power of the world’s most admired brands in the hands of cybercriminals....
Massachusetts-based UMass Memorial Health is the latest large healthcare network to report an email phishing incident that potentially compromised hundreds of thousands of individuals' protected health information. The unauthorized email access lasted about seven months.
As the global pandemic enters its second year, IT and infosec teams continue to face challenges on all sides. On top of “ordinary” cybersecurity issues, they’re dealing with an explosion of pandemic-themed phishing scams and a surge in ransomware attacks. How well prepared are users?
Yes, you know they are coming. And yes, the fraudsters have raised their game. But that doesn't mean you can't stop socially engineered attacks before threat actors can pull off their scams. Mike Britton of Abnormal Security tells you how.
Two proposed class action lawsuits filed this week in a California federal court allege negligence and a variety of other claims against UC San Diego Health in the wake of a phishing incident that affected nearly 496,000 individuals.
Chinese security researcher Pan Xiaopan has discovered a malware targeting Mac users. The malware, spread via a paid advertisement on search engine Baidu, is intended to harvest user credentials, he says. The advertisement has now been taken down.
The COVID-19 crisis has posed an unparalleled challenge for cybersecurity. Like COVID-19, cyberattacks spread fast and far - creating more and more damage. But the pandemic has also had a positive impact on the cybersecurity function, which Tarun Kumar, CISO at Nissan, describes here.
Microsoft Security on Tuesday issued a detailed report on a massive phishing-as-a-service operation named BulletProofLink that offered as a subscription all the tools needed to conduct a campaign. The gang remains operational.
Are we good? It’s what every security team hears from their Execu-folk when a new attack lands in the headlines. The good news is there are plenty of precautions you can take to protect yourself and make it easier to recover quickly when ransomware strikes.
Join us for this webinar where we’ll take you...
Even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses, which today’s determined hackers can exploit at will. There’s even a term for it: Assume Breach.
But assuming you’ll be hacked isn’t an option for you. Your organization can’t afford a loss of...
The scary fact is that human error is a contributing factor in more than 90% of breaches, and even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses. With so many technical controls in place hackers are still getting through to your end users, making them your last...