Cloud email security: It involves new strategies and tools to defend against a new wave of attacks. Arun Singh of Abnormal Security discusses the latest flavor of email attacks and the new Knowledge Bases created to help enterprises increase their education and defensive capabilities.
The losses from phishing and other forms of sophisticated email fraud in 2021 alone totaled over $44 million, and the volume of phishing and email spoofing attacks doubled in 2021. Many malicious data breaches are caused by stolen credentials rather than the installation of malware. In fact, IBM found that in 2021,...
Social engineering scams are on the rise globally. Last year, these scams increased 57% with an average lost of $1,029 USD per victim. Aside from the inability of legacy fraud controls to detect real-time social engineering, the circumstances of a scam can influence liability if the parties involved are unable to...
Our online evolution has accelerated drastically in recent years, with more than 30 billion internet-capable devices now online, six times as many as there are people on the planet, according to McKinsey.
Cybercrime, specifically fraud, is rising nearly as fast as our global digital transformation. Protecting...
For many brands, especially large enterprises with a substantial online presence, it is important to be able to have eyes all over the internet in order to properly mitigate the effects of external elements on their brand’s reputation.
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods?
Password complexity, length, and rotation requirements are the bane of IT...
Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.
Security firm Group-IB has identified 34 hacking groups that are now selling a stealer-as-a-service model to spread infostealer malware and steal credentials from online gaming and payment accounts. The company advises organizations to be on the lookout for Raccoon and Redline infostealers.
Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.
Banks are getting better at catching a wide range of scams targeted at customer accounts, but they are still struggling with stopping authorized payment fraud through peer-to-peer payment companies such as Zelle, says David Pollino, former divisional CISO with PNC Bank.
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges.
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks, director of security operations at CertiK, shares how the funds may have been stolen and what happens next.
The United Kingdom and many other countries are considering ways to make banks liable for authorized payment fraud and lift the burden from millions of victims of online scams. Trace Fooshee, strategic adviser at Aite-Novarica Group, shares his views on why this might not be such a great idea.
An average of 715,600 email phishing attacks every month exploited a top 100 brand while $1.7billion was lost in 2019 to
impersonation via business email compromise and other phishing attacks.
Download this guide to learn more about the brand protection solutions like:
DMARC
Brand exploit protect
SAFE phish...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.