phishing

Secure email gateways struggle to keep pace with sophisticated phishing campaigns

Secure email gateways struggle to keep pace with sophisticated phishing campaigns 2024-02-23 at 07:02 By Help Net Security In 2023, malicious email threats bypassing secure email gateways (SEGs) increased by more than 100%, according to Cofense. In just two years, Cofense identified over 1.5 million malicious emails bypassing their customers’ SEGs, signaling a 37% increase […]

React to this headline:

Loading spinner

Secure email gateways struggle to keep pace with sophisticated phishing campaigns Read More »

Clean links and sophisticated scams mark new era in email attacks

Clean links and sophisticated scams mark new era in email attacks 2024-02-20 at 06:05 By Help Net Security Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, according to VIPRE Security. The rise of the EML file attachments

React to this headline:

Loading spinner

Clean links and sophisticated scams mark new era in email attacks Read More »

Corporate users getting tricked into downloading AnyDesk

Corporate users getting tricked into downloading AnyDesk 2024-02-14 at 11:16 By Helga Labus Hackers are leveraging the AnyDesk remote desktop application in a phishing campaign targeting employees, Malwarebytes warns. The AnyDesk phishing campaign In a phishing campaign recently discovered by Malwarebytes researchers, attackers targeted potential victims via email or SMS, personalized to match their roles

React to this headline:

Loading spinner

Corporate users getting tricked into downloading AnyDesk Read More »

Protecting against AI-enhanced email threats

Protecting against AI-enhanced email threats 2024-02-13 at 07:31 By Helga Labus Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals. Its ability to process large amounts of data and quickly generate results has contributed to its widespread adoption. AI in the hands of cybercriminals

React to this headline:

Loading spinner

Protecting against AI-enhanced email threats Read More »

Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration

Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration 2024-01-25 at 15:01 By neetha871ad236bd CRIL analyzes an ongoing phishing campaign spreading an updated version of Atomic Stealer targeting Mac users. The post Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration appeared first on Cyble. The post Uncovering Atomic

React to this headline:

Loading spinner

Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration Read More »

Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend 

Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend  2024-01-25 at 13:16 By neetha871ad236bd There is no excerpt because this is a protected post. The post Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend  appeared first on Cyble. The post Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence

React to this headline:

Loading spinner

Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend  Read More »

Top cybersecurity concerns for the upcoming elections

Top cybersecurity concerns for the upcoming elections 2024-01-23 at 07:01 By Help Net Security In this Help Net Security video, Adam Marrè, CISO at Arctic Wolf, explains how state and local governments must focus on cybersecurity as the 2024 election approaches in the United States. State and local IT and cybersecurity teams usually have few

React to this headline:

Loading spinner

Top cybersecurity concerns for the upcoming elections Read More »

Organizations need to switch gears in their approach to email security

Organizations need to switch gears in their approach to email security 2024-01-23 at 06:02 By Help Net Security Email security risks remain high with 94% of organizations experiencing incidents in the past 12 months, according to Egress. Inbound email incidents primarily took the form of malicious URLs, attacks sent from a compromised account, and malware

React to this headline:

Loading spinner

Organizations need to switch gears in their approach to email security Read More »

Out with the old and in with the improved: MFA needs a revamp

Out with the old and in with the improved: MFA needs a revamp 2024-01-19 at 08:02 By Help Net Security From AI to ZTA (zero-trust architecture), the technology responsible for protecting your company’s data has evolved immensely. Despite the advances, cybercriminals repeatedly find new and creative ways to gain access to sensitive information. This can

React to this headline:

Loading spinner

Out with the old and in with the improved: MFA needs a revamp Read More »

The right strategy for effective cybersecurity awareness

The right strategy for effective cybersecurity awareness 2024-01-17 at 07:31 By Helga Labus Employees play a significant role in safeguarding organizational assets. With a constantly evolving threat landscape, cybersecurity awareness training is an essential component in creating a good security culture. Why cybersecurity awareness training? 81% of organizations were hit by malware, phishing, and password

React to this headline:

Loading spinner

The right strategy for effective cybersecurity awareness Read More »

Flipping the BEC funnel: Phishing in the age of GenAI

Flipping the BEC funnel: Phishing in the age of GenAI 2024-01-15 at 08:02 By Help Net Security For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out to thousands of recipients in the hope that a few might take the

React to this headline:

Loading spinner

Flipping the BEC funnel: Phishing in the age of GenAI Read More »

The growing challenge of cyber risk in the age of synthetic media

The growing challenge of cyber risk in the age of synthetic media 2024-01-09 at 07:01 By Help Net Security As AI tools become more widespread, impersonation and deception have become easier. However, organizations are combating this issue with policies and technological solutions. In this Help Net Security video, Mike Bechtel, Chief Futurist at Deloitte, discusses

React to this headline:

Loading spinner

The growing challenge of cyber risk in the age of synthetic media Read More »

Social engineer reveals effective tricks for real-world intrusions

Social engineer reveals effective tricks for real-world intrusions 2024-01-08 at 08:31 By Mirko Zorz In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for gathering target information. Street explores the overlooked threat of physical security and the human tendency to

React to this headline:

Loading spinner

Social engineer reveals effective tricks for real-world intrusions Read More »

Breaking down the state of authentication

Breaking down the state of authentication 2024-01-05 at 07:02 By Help Net Security In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey revealed: – 39% indicated phishing is the most feared cyberattack, while 49% said it is the

React to this headline:

Loading spinner

Breaking down the state of authentication Read More »

Qakbot returns in fresh assault on hospitality sector

Qakbot returns in fresh assault on hospitality sector 18/12/2023 at 15:47 By Helga Labus The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing campaign attempting to deliver it to targets in the hospitality industry. Qakbot and its

React to this headline:

Loading spinner

Qakbot returns in fresh assault on hospitality sector Read More »

Digital ops and ops management security predictions for 2024

Digital ops and ops management security predictions for 2024 14/12/2023 at 08:32 By Help Net Security CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI at everyone’s mind. Instead of playing catch-up regarding the security of emerging tech like generative AI, organizations will prioritize

React to this headline:

Loading spinner

Digital ops and ops management security predictions for 2024 Read More »

Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws

Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws 12/12/2023 at 23:47 By Ryan Naraine Microsoft warns of critical spoofing and remote code execution bugs in the Windows MSHTML Platform and Microsoft Power Platform Connector. The post Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws Read More »

What custom GPTs mean for the future of phishing

What custom GPTs mean for the future of phishing 30/11/2023 at 08:03 By Help Net Security OpenAI is putting more power into the hands of users of GenAI, allowing them to create their custom AI agents without writing code. These custom GPTs are the latest leap forward in the rapidly evolving AI landscape, but this

React to this headline:

Loading spinner

What custom GPTs mean for the future of phishing Read More »

Organizations can’t ignore the surge in malicious web links

Organizations can’t ignore the surge in malicious web links 30/11/2023 at 07:02 By Help Net Security Despite the rising adoption of collaboration and instant messaging software, email remains a significant area of concern regarding cyber attacks, particularly the increasing threat of cybercriminals employing harmful web links in emails, according to Hornetsecurity. Attack techniques used in

React to this headline:

Loading spinner

Organizations can’t ignore the surge in malicious web links Read More »

Scroll to Top