The evolution of business email compromise to business communication compromise

Business Email Compromise (BEC) attacks are no longer limited to traditional email accounts. Attackers are finding new ways to conduct their schemes — and organizations need to be prepared to defend themselves. Attackers are leveraging a new scheme called Business Communication Compromise to take advantage of large global corporations, government agencies and individuals.¬†They are leveraging collaboration tools beyond email that include: chat and mobile messaging — including popular cloud-based applications such as Slack, WhatsApp, LinkedIn, Facebook, Twitter and many more — to carry out attacks. Clearly, BEC is evolving into “business communication compromise” instead of strictly being based on email.¬†This … Continue reading The evolution of business email compromise to business communication compromise