Email Security | SC Media

Email Security

Facebook says it ‘unintentionally’ harvested 1.5M users’ email contacts via verification feature

By

Facebook has once again stoked controversy after the social media giant reportedly owned up to “unintentionally” collecting the email contacts of 1.5 million users without their consent. Business Insider revealed the company’s latest data mismanagement gaffe in an April 17 news report, after its staff members created a fake account and entered an email password…

Microsoft web mail services breached after support agent’s credentials are compromised

By

Hackers reportedly compromised a Microsoft Corp. support agent’s credentials, allowing them to gain unauthorized access to the company’s various web-based email services, including Outlook, MSN and Hotmail, for at least three months in 2019. This breach exposed not only information pertaining to certain customers’ email accounts, but also in some cases the content of the…

Emotet now using stolen emails for new attacks

By

The Emotet gang has started using the emails it stole in October 2018 marking a major milestone for the group and its activities. Cofense reported the group has so far sent more than 1,000 unique emails, with their own subject line, sent and is part of an effort to get away from using template-based emails…

ZixProtect

ZixProtect with targeted threat protection is a multilayered SaaS-based email security and compliance solution focused on small to medium-sized companies. It provides email threat protection, business email continuity, email encryption and email data loss prevention with focus on ease of use for customers. Email threat protection uses a multilayered filtering approach to protect against spam,…

Vade Secure for Office 365

Vade Secure for Office 365 is a fully native cloud solution with AI-based, predictive email defense. It protects against phishing attempts, spear phishing, business email compromise attacks, malware, ransomware, spam, and GreyMail. It also features behavior-based anti-malware, insider attack protection, anti-phishing, anti-spear phishing, and protects against CEO fraud. This product leverages Office 365’s built-in capabilities…

Product Reviews Opener – Email Security

Email is one of the largest communication methods available, so it is no wonder it’s among the favorite attack vectors to target. Organizations rely on email to keep their businesses running, but very few place the importance on properly securing it. Email security refers to the collective measures used to secure the access and content…

Google, Facebook fraudster pleads guilty to stealing $123 million in BEC scams

By

A Lithuanian man plead guilty in the U.S. District Court Southern District of New York earlier this week for using an advanced business email compromise campaign to defraud Google and Facebook out of an estimated $123 million. Evaldas Rimasauskas was indicted in December 2016 then arrested in Lithuania in March 2017 and extradited to the…

NetflixRat

Amex, Netflix customers targeted in phishing campaign

By

Windows Defender Security Intelligence’s Office 365 Threat Research team has uncovered a phishing campaign targeting Netflix and American Express that attempt to steal payment card information. The campaign was detected on the weekend of March 16 and is still active, according to the Windows Defender Security Intelligence Twitter feed. In each case the phishing emails…

Rutland Regional Medical Center, Zoll reveal data breaches

By

Two healthcare organizations suffered data breaches due to their email service resulting in more than 72,000 records being exposed. Rutland Regional Medical Center in Vermont reported several employee email accounts have been compromised, while the medical products firm Zoll had data possibly exposed when an email server migration went awry. In both cases the patient…

Persistence and scale signature moves of new Monero miner campaign

By

A new Monero cryptomining campaign has been detected in the wild being spread and operating in a manner more consistent with ransomware and other attacks that retain a level of persistence than has been seen before. Check Point researchers said these mining operations have been on-going since mid-January using two specific trojans, Trojan.Win32.Fsysna and an…

Next post in Cryptocurrency