Patch Tuesday - not the favorite day of the month for your security team as zero-day threat alerts or newly discovered vulnerabilities invariably lead to a disrupted work schedule that involves multiple teams a...
Credential phishing is one of the most popular threats businesses and individuals need to face in today's cybersecurity landscape. In recent years cre...
Phishing is involved in almost 40% of security incidents, according to the 2022 Unit 42 Incident Response Threat Report. Attacks that once relied on poorly written phishing emails...
Secure email gateways don’t always catch everything, so identifying and quarantining phishing emails that have bypassed that security is crucial to di...
In our new hybrid world, users work from anywhere – with many new ways that applications and devices are connected. This puts a lot of responsibility on end users, as many of the most common and pervasive cyber...
Ransoms have come a long way since the days of a note constructed of cutout magazine letters being dropped in a target’s mailbox. As with many other t...
The unending torrent of threats has created an environment where spear phishing attacks and other business email compromises happen daily. To combat this, many organizations have i...
The office has moved into the home to join a crowded network shared by family members, guests and lots of smart devices. This seismic shift to a work-...
It was a typical day for our client, an executive with a U.S. financial services firm that relies on a widely used multi-factor authentication (MFA) mobile app to protect access to email, customer files and oth...
Within the threat landscape, email phishing is one of the main techniques used by attackers to gain access to critical systems and data. However, secu...
The current security landscape is filled with targeted attacks, including sophisticated phishing and spear-phishing campaigns, and as many threat actors as defenders. Beyond stealing credentials, attackers are...
On May 27, 2021, Microsoft reported a wide scale spear phishing campaign attributed to APT29, specifically the associated group Nobelium, the same thr...
In the last five years or so, we have become closely acquainted with Security Operation Center (SOC) teams that use Cortex XSOAR. One of the first things we learned was that reviewing potential phishing inciden...
With COVID-19 now a global pandemic, the rapid expansion of the remote work environment has opened up new challenges for enterprises. The attack surface is growing, providing lucrative opportunities for those w...
About a year ago when I was consulting with a data science company, I received an email from the company CISO asking me to urgently send him several Amazon gift cards so he could distribute them to customers at...
Phishing emails are one of the most frequent, easily executable, and harmful security attacks that organizations – regardless of size – face today. With over 90% of all data breach...
In recent research, Palo Alto Networks found attackers were creating fake versions of some well-known and well-trusted websites – including Adobe, DropBox, Facebook, and others- an...
Phishing remains one of the most dangerous threat vectors of cyberattacks. Even though Exploit Kits are on the decline overall, as we outlined in our posting Rig EK One Year Later: From Ransomware to Coin Miner...
Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.