As organizations have moved their email servers from on-premise systems like Microsoft Exchange to cloud services like Microsoft 365, there are more ways to secure email than ever before. From native security to a secure email gateway to integrated cloud email security solutions, the options are nearly limitless....
The move to cloud email has allowed companies to streamline security investments and leverage the native Microsoft functionality provided by Exchange Online Protection (EOP) and Defender for Office 365 (MDO). But this approach isn’t perfect, and many companies have realized that they need an additional layer of...
Business email compromise (BEC) continues to grow year after year, now making up 35% of all cybercrime losses. By exploiting the relationships people have established with their executives, coworkers, and partners, business email compromise attacks dupe both traditional email security tools and the humans they target....
Attackers used a phishing campaign to direct unwitting Microsoft business email customers into supplying logon credentials to a proxy server. Attackers stole online session cookies, allowing them to defeat MFA and access inboxes. From there, they emailed corporate vendors to obtain financial data.
The past few years have shown us a tremendous shift in BEC attacks, which changed its strategies from Executive Impersonation to opting to impersonate third party vendors and suppliers instead. This shift has given the threat actors a plethora of additional trusted identities to exploit.
This Threat Intelligence...
Nearly 20,000 attacks. An average loss of $120,000 per attack. Billions of dollars sent to cybercriminals each year. Business email compromise is no joke, and it’s continuing to increase—despite increased awareness of the issue.
Why? Because the people behind these scams know how to trick humans, relying on...
Abnormal Security is out with new financial crimes research, and it
shows that traditional business email compromise is evolving into
new forms of financial supply chain compromise. Crane Hassold
shares insights on the crimes and how best to detect, deter and
respond to them.
In a video interview with Information...
Ransomware continues to pummel organizations, with the average ransom payment reaching $925,000 so far this year, but the aggregate financial impact of business email compromise attacks is even worse, says Wendi Whitmore, head of Unit 42 at Palo Alto Networks.
Abnormal Security is out with new financial crimes research, and it shows that traditional business email compromise is evolving into new forms of financial supply chain compromise. Crane Hassold shares insights on the crimes and how best to detect, deter and respond to them.
The new Expel Quarterly Threat Report provides even more data on what we’re seeing, detection opportunities, and resilience recs to help protect your organization — now on a quarterly basis.
At the start of 2021, vaccine rollout let people imagine an end to pandemic disruption. But some of the world’s smartest cyber criminals weren’t interested in returning to business as normal. Over the first half of the year, a series of ransomware attacks on global infrastructure pushed cybersecurity to the top of...
The latest edition of the ISMG Security Report discusses how the leader of a "transnational cybercrime syndicate" has been arrested in Nigeria, according to Interpol. It also shares updates on U.S. privacy laws and how we can improve collaboration as an industry.
The new Expel Quarterly Threat Report provides data on what we’re seeing,
detection opportunities, and resilience recs to help protect your organization.
We’ll dive into the trends in this report, based on incidents the Expel security
operations center (SOC) team identified through investigations into...
The new Expel Quarterly Threat Report provides data on what we’re seeing,
detection opportunities, and resilience recs to help protect your organization.
We’ll dive into the trends in this report, based on incidents the Expel security
operations center (SOC) team identified through investigations into...
If you were a nation with legions of hackers at your disposal, seeking to sidestep crippling international sanctions, would you look to ransomware to fund your regime? That question is posed by new research that finds state-sponsored North Korean hackers haven't stopped their ransomware experiments.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.