The phishing bait you're most likely to take
Phishing is the most common form of cyberattack as criminals seek to obtain credentials to access bank accounts or corporate networks.
Abnormal Security has analyzed which phishing attacks generate the highest click rate and categorized them based on the words included in the subject line.
Employees tricked into downloading remote monitoring software
New research from Malwarebytes reveals that employees are being tricked into downloading remote monitoring and management tools like AnyDesk to open up back doors to corporate networks.
In a standard phishing technique potential victims are targeted via an email or SMS message, personalized to match their roles within the organization. The link in the email goes to what looks like a legitimate bank website with a link to open a chat support session.
Cybercrime tactics evolve to embrace AI and online ads
A new report from BlueVoyant looks at the new risks organisations face from outside the traditional IT perimeters.
In particular, cybercriminals are using AI to create more effective phishing campaigns, and employing online adverts to lure victims to malicious websites.
As-a-Service tools dominate the cyber threat landscape
Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools now make up the majority of malicious tools in use by attackers, according to a new study.
The report from Darktrace shows malware loaders (77 percent of investigated threats) are the most common tool, followed by cryptominers (52 percent), and botnets (39 percent).
The top phishing themes of 2023
New research from Cofense reveals the most common phishing themes of last year, which offer insight into the threat actor's intentions.
Information analyzed to determine the theme includes the brand being spoofed, any attachment names, rendered attachments in the case of documents or HTML files, and the email body content, plus of course the subject.
Free link checker helps identify malicious websites
Cybersecurity company NordVPN is launching a new, free tool to allow users to check the safety of a website before visiting it.
Link Checker scans a site for different types of malware and delivers a notification about whether it's fake or infected with phishing scams.
81 percent of security pros say phishing is the top threat
A new study finds that that most organizations anticipate phishing (81 percent), malware and ransomware (76 percent), and accidental data loss (63 percent) will be the top security risks over the next six months, followed by social engineering (55 percent) and third-party risks (52 percent).
The report from Fortra looks at the challenges security professionals have faced over the past year, as well as what they plan to focus on next as they continue to embrace digital transformation, new hybrid infrastructures and a challenging security landscape.
94 percent of organizations suffer email security incidents
According to a new study, 94 percent of global organizations have experienced email security incidents last year, up two percent from the year before.
The latest Email Security Risk Report from Egress looks at attitudes and approaches to email security, the evolution of risks, and the impact of incidents, based on responses from 500 cybersecurity leaders.
Ditching passwords in favor of passwordless, phishing-resistant authentication [Q&A]
According to the FIDO (Fast Identity Online) Alliance, passwords are the root cause of more than 80 percent of data breaches. And yet, many organizations -- both big and small -- continue to use this antiquated approach to authentication. In fact, recent research from Yubico, which surveyed more than 16,000 employees across eight countries, found 59 percent of respondents still rely on usernames and passwords as their primary method of authentication.
Why do we continue to see the same old same old, especially when the authentication industry has made such significant strides in not only passwordless but also phishing-resistant authentication? We spoke with Axiad founder and co-CEO Bassam Al-Khalidi to get an answer to this question and find out how companies can make the move to a passwordless, phishing-resistant future. Read on to hear what he had to say.
How AI is weaponized for cyberattacks
A new report from Abnormal Security highlights real-world examples of how AI is being used to carry out cyberattacks.
Generative AI allows scammers to craft unique email content, making detection that relies on matching known malicious text strings infinitely more difficult.
Almost 90 percent say they're prepared for password-based attacks -- but half still fall for them
A new report from Axiad shows that 88 percent of IT professionals feel their company is prepared to defend against a password-based cyberattack, yet 52 percent say their business has fallen victim to one within the last year.
Based on over 200 responses from US IT pros, the study shows 39 percent think phishing is the most feared cyberattack, while 49 percent say it's the attack most likely to happen.
Beyond phishing: The top employee security risks you're probably not measuring
While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.
Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.
Beyond phishing: The top employee security risks you're probably not measuring
While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.
Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.
Prolific Puma protects pernicious phishing plotters
We're all familiar with link shortening services, those handy tools that allow you to shrink URLs down to a manageable size to make them easier to share.
Of course in the past these have been used for nefarious purposes too, hiding the true nature of a link to get people to click on phishing or malware messages. Now though researchers at Infoblox have uncovered something even more sinister, the operation of a shady link shortening service made especially for cybercrime.
Unmasking data security monsters this Halloween
It is very nearly Halloween and we are preparing ourselves to encounter a host of terrifying creatures and monsters, all who are patiently waiting to make their appearances this year. However, while those beings are terrifying in their own right, it's the monsters lurking in the shadows of the digital world that seem to strike more fear.
Malicious actors and menacing threats feel ever present in the news. As the adoption of cloud and on-demand computing services increases, malicious actors are waiting to make their move when enterprises lose control of their data security. Enterprises and their leaders are kept awake wondering where their data is, who has access to it, how it is being used and whether it’s safe. This piece will explore how to mitigate some of the most scary monsters that are haunting organizations the holiday season and beyond.
