Thousands of BEC lures use Google Forms in recon campaign
While the threat actor’s motives are not fully apparent, researchers believe it was an effort to conduct reconnaissance for future campaigns.
While the threat actor’s motives are not fully apparent, researchers believe it was an effort to conduct reconnaissance for future campaigns.
Continued attacks from nation-states, new strains of ransomware, domestic political turmoil, and the reality that it will take several months for the COVID-19 pandemic to resolve will make it a challenging year for security pros. Today’s columnist, Mick Baccio of Splunk, offers some insights on how to manage the year ahead.
In Nov. 2020 alone, company blocked 262 million emails containing malicious, remotely hosted images.
This effect partly answers one of the most enduring conundrums in cybersecurity: why do people keep clicking on bad emails, causing email data breaches?
In theory they know better. But Users naïvely trust workplace communications platforms, despite phishing and impersonation threats.
A phishing campaign has been disguising its spam as an email chain, using messages taken from email clients on previously compromised hosts.
The poor record raises questions about whether the mobile carrier’s massive merger with Sprint left the combined company more vulnerable.
Vaccine distribution could mean a return to offices, but most experts expect a new hybrid model to emerge. Pile that on top of the already challenging situation posed by a supposed skills gap and efforts to improve diversity, and the cybersecurity community may need to redefine workforce priorities.
Editor’s Note: This set of reviews originally appeared in February 2020. To find out more about SC Labs, contact Adrian Sanabria at [email protected] The use of collaborative tools and technologies is on the rise with email topping the list. That explains why it faces such relentless attacks. Email communications are leveraged to keep businesses running…
Enhanced email security? Growth of digital identities? Vulnerability management born from mergers and acquisitions? No more VPNs? Here, cybersecurity experts offer their take on what strategic shifts we should expect within the enterprise.