
Business Email Compromise Attacks Spike 269%
Geraldine HuntAccording to an email security risk assessment report, BEC attacks ramped up 269 percent on a quarterly basis. More than 60,000 messages contained BEC or impersonation frauds.
According to an email security risk assessment report, BEC attacks ramped up 269 percent on a quarterly basis. More than 60,000 messages contained BEC or impersonation frauds.
Online shopping at risk, this Christmas pay attention as entering URLs.Fake retail websites tend to increase during the holiday shopping season.
Eliminating malware at its delivery mechanism doesn’t take a complex system. With the right setup, DMARC is a valuable cybersecurity tool that defends against phishing and malicious email content.
The education sector is one of the most targeted industries and this trend is continuing. Why are Educational Institutions being targeted for ransomware and phishing attacks?
For a hacker, social media is rich pickings. It's the perfect place to gather valuable information to fuel spear phishing attacks or social engineering campaigns to push out malware.
DNS filtering implements web filtering during the query process. Administrators set up policies that block specific IPs categorized as inappropriate for a corporate environment.
Nodersok uses its proxy capabilities to perform click fraud. Users click on advertising, the malware creator earns money in fraudulent clicks that seem like valid traffic to the ad network.
The most recent school district to fall victim to ransomware attacks was the Flagstaff Unified School District. Soon after, Connecticut’s school districts fell victim to ransomware attacks.
Attackers focus on human flaws rather than vulnerabilities in technology. It’s much easier to exploit user mistakes that gives an attacker access to an internal network.
Brexit related phishing campaigns are increasing as the Brexit deadline approaches. It’s common for cybercriminals to piggy-back on major political events to try and spread malware.
The US utilities attack in 2019 was a reminder that federal infrastructure must take precautions to protect from common attacks. Only a multi-layered security approach can provide the protection needed.
K-12 schools are an attractive target for cybercriminals because attacks are relatively easy and the potential rewards are high. Student information sells for exorbitant amonts on the black market.
Cybercriminals are constantly looking for new attack avenues and exploits. In Part 2 of this series, we outline five top network security resources for IT pros to refer to, to help...
CAPTCHA phishing isn’t new. Attackers used it to trick users into installing malware disguised as an Adobe Flash update.
Every browser connection uses DNS to connect to the remote server, and encoding will not change the DNS query during a browser’s URL processing.
Recent phishing attacks have been taking advantage of users trust in popular sharing sites. These OAuth attacks are common in the wild and often use access verification messages.
Some businesses find Office 365's spam filter basic and lacking when it comes to detecting highly-sophisticated cyber threats especially advanced and persistent spear phishing attacks.
Spear phishing involves an attacker trying to trick users into disclosing sensitive information or sending money to an attacker-controlled bank account.
Phishing attacks take advantage of automatic google calendar events. Fake and malware-laced event reminder notifications are presented to the user multiple times.
While the malware strains involved in the attacks on Rivera Beach and Lake City were different, were both launched via a phishing attack.
By adding strong 3rd party email filtering and anti-phishing protection, an organization using Office 365 greatly reduces the possibility of an identity-based email attack.
With the onslaught in phishing, zero-day threats and malware attacks, basic security isn’t enough for SMBs. Today’s sophisticated threats need sophisticated defenses for a strong email security posture.
The Carbanak source code resided inconspicuously for two years until researchers discovered the malware. Several key members of FIN7 were later arrested and charged with 26 felonies.
Consistency, scalability, flexibility and custom-tailored solutions for each client are key for running an effective, security-minded MSP.
Now is the perfect time for MSPs to strengthen their technology stack and begin offering security services while staying ahead of the competition.
MSPs now find their markets much more competitive as new competitors enter the field. Here we share some key lessons to running an effective, security-first MSP company.
BEC scams resulted in losses of over $1.2 billion in 2018 – more than twice the losses to BEC attacks reported in 2017. 2019 is likely to see losses increase further.
Hutchins have the notoriety of single-handedly stopping one of the most devastating malware attacks, but he was also known for his contributions on a cybersecurity blog known as MalwareTech.
Botnet members (Bots) often troll for new prospects through automated scanning processes seeking out devices with prescribed vulnerabilities. Are your users' devices open for hackers to access?
Weaponized PDF documents aren’t just limited to email attacks. Many websites contain links allowing users to download seemingly safe PDF files.
Botnet attacks are responsible for the largest DDoS and command & control attacks on record. Criminals use botnets to flood legitimate networks with a crushing volume of traffic.
Security experts have observed an increase in attacks using embedded malware in fake 'Game of Thrones' downloads. The latest 'Game of Thrones' threat is mainly distributed via email.
If an attacker cracks encryption keys, users on the Wi-Fi network are susceptible to man-in-the-middle (MitM) attacks. Wi-Fi filtering protects users from these malicious attacks.
This latest phishing scam is a fake claim that a person’s Paypal account is in danger of being suspended. The url directs the target to visit a bogus page.
The profession of system administrator is under threat in many ways, including self-managing products and a trend toward outsourcing system administration type tasks.
Research published at the BlackHat hacker conference in 2018 suggests that Wi-Fi vulnerabilities could give hackers access to not only aircraft but ships, military personnel vehicles, and emergency services.
Wi-Fi guests can be exposed to dangerous websites and malware. WebTitan Cloud for Wi-Fi allows you to control the content accessed, creating a safe environment for internet use.
The cybersecurity challenges of the recent US Goverement shutdown can provide important lessons for the private sector as well.
Sextortion scams are using spoofing techniques to trick users. What makes these sextortion emails so convincing, and so dangerous, is the level of personalization involved.
With cloud-based DNS security threats found amongst your web traffic are terminated before they ever reach your network or endpoint devices. You simply redirect your DNS traffic.
A new alert warns that MSPs have become the latest target for cyber attacks. The attacks target any managed provider across several IT sectors including MSPs and cloud service providers.
With the introduction of hundreds and thousands of new malware samples daily, the use of a cloud-based DNS filtering solution is now crucial to eliminate malicious content at source.
Spear-phishing attacks prey on the weakest employee link, but attackers have a new target in their sights – MSPs. Attackers know that MSPs have access to a plethora of system-critical data.
While new revenue for MSP services has risen by 42 percent in 2018, profit margins have shrunk by 30 percent. Choosing the right cloud service partners will help reverse this worrying trend.
Homeland Security warns that MSPs are under increasing attack from hackers. This is a serious threat and strong reminder that MSPs must protect their businesses and customers.
Wi-Fi hotspots are vulnerable to cyber attacks because anyone can join the network once the password is known, even hackers.
Transportation IT teams face the challenging task of providing Wi-Fi that meets customers’ demands while protecting guests and the operator from malicious content and malware.
DNS-based filtering offers a way to seamlessly integrate with current infrastructure. Network administrators can block IP addresses, rendering attacks based on URLs, domains and phishing emails useless.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us