While historically the origin of most business email compromise (BEC) attacks has been West Africa, residing in Nigeria certainly isn’t a requirement for BEC attackers. Indeed, the subject of this report is a sophisticated threat group based in Israel.
The group is unique in that they impersonate executives and...
Security researchers say a slight modification to a Microsoft Exchange zero day attack used by Russian state hackers can bypass a patch the computing giant introduced in March. Microsoft patched the modified attack during this month's dump of fixes, rating the bug as "important" but not "critical."
Business email compromise, end-user education, forensic archiving and recovery can be confounding to SMBs that lack the resources for a traditional secure email gateway. The rise of cloud-based email offerings means that SMBs can now get the same level of email protection without using a gateway.
Cybersecurity is forever a growing concern for organisations of all sizes. The challenges include a spike in threats, the evolving technology landscape that increases the threat surface, the impact of regulation, too many isolated point products, and a lack of skills and budget for adequate defence.
Companies are...
When you think of using biometric technology as part of your multi-factor authentication process, you assume these attributes are safe. Cybercriminals can’t hack your fingerprints, can they? The answer may surprise you!
Biometric attributes aren’t as safe as they once were. Cybercriminals are always coming up...
Microsoft 365 offers tiers of security features, but their email security capabilities may not be as robust as their popularity. Learn how Fortra Email Security can be deployed alongside Microsoft 365 to ensure your organization’s valuable information remains secure — whether it’s housed on-premise, in the...
CISOs have faced a broad and varied set of challenges in recent years. Remote environments, increasingly sophisticated threats and expanding supply chains are just some of the many concerns keeping them up at night.
Cybercriminals have been launching attacks against our people, networks, and services for decades with varying success. So, the need to realign our defences to meet the demands of evolving threats is nothing new.
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
Cyren plans to cease operations and pursue liquidation after the email security and threat detection vendor failed to sell assets or raise more capital. The company terminated the employment of all remaining workers, commenced a bankruptcy proceeding in Israel and told Nasdaq to delist the company.
Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe and break down BEC attacks—let alone conceptualize them—researching and...
As the pandemic abruptly shifted the work landscape, cyber attackers quickly evolved their tactics, which include ransomware, business email compromise, and account takeover attacks. And phishing attacks are persistent. But guess what. So are we.
Proofpoint is a vendor with end-to-end solution. We're confident that...
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets move to the cloud, attackers have followed close behind. This cloud account compromise threat brief will help you understand:
The anatomy of cloud account takeover
What damage cyber criminals can do with a...
The latest IBM Cost of a Data Breach report highlighted that 19% of total data breaches are due to compromised and stolen credentials, resulting in $4.5 million in losses, and 40% of ransomware attacks start through email. So how do you protect this vital communications channel?
Security leaders have many options...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.