Great eXpeltations is Expel’s annual report sharing the most significant data from our security operations center (SOC) in our threat detection and response efforts. It curates that data into trends that can impact your cybersecurity posture and offers resilience recommendations to protect your organisation and what...
A leader of an international crime network that attempted to launder more than $25 million in fraudulently obtained funds, including through business email compromise, received a sentence of more than a decade in prison. Valentine Iro, 34, pleaded guilty to conspiracy to engage in money laundering.
Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe and break down BEC attacks—let alone conceptualize them—researching and...
A joint law enforcement operation led to the dismantling of what authorities describe as a Franco-Israeli "large-scale CEO fraud" criminal network that stole millions from French victims and laundered the proceeds via banks in China and Israel. The group's single biggest attack netted $40 million.
Cybercriminals exploited the verification process for Microsoft-certified authentication apps to obtain access to the inboxes of financial and marketing companies. Among the permissions threat actors sought were access to emails and calendars, says cybersecurity firm Proofpoint.
Cloud email security: It involves new strategies and tools to defend against a new wave of attacks. Arun Singh of Abnormal Security discusses the latest flavor of email attacks and the new Knowledge Bases created to help enterprises increase their education and defensive capabilities.
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
U.S. federal prosecutors indicted four men charged with engaging in business email compromise and credit card fraud schemes that netted them $9.2 million. The FBI has warned that business email compromises - whether through account compromise or impersonation - is a growing threat.
Cybercrime is always evolving as threat actors find new ways to infiltrate organizations, steal money, and cause damage. So what should you prepare for in 2023?
Join this webinar with Crane Hassold, Director of Threat Intelligence at Abnormal Security, where he’ll dive into the trends we saw in 2022 and provide...
Tout le monde reçoit des emails de phishing. Mais tout le monde ne tombe pas dans leur piège. Lisez notre huitième rapport annuel State of the Phish pour en savoir plus sur la vulnérabilité des utilisateurs aux cybermenaces actuelles les plus redoutables. Ce rapport explore en profondeur les menaces actuelles et...
Compromised accounts may be the most dangerous email threat that organizations face. Once an account has been compromised, it can be used to execute additional attacks—providing threat actors a variety of opportunities to steal funds and sensitive information.
And because the messages are being sent from the...
Migrating to cloud-based productivity platforms like Microsoft 365 and Google Workspace comes with easier collaboration, more agility, less maintenance, and reduced costs.
Yet, email attacks become a larger challenge as we work to keep data and employees safe in a cloud-based environment. How can you minimize these...
The ongoing global logistics disruptions stemming from the COVID-19 pandemic continue to impact businesses and consumers as the flow of consumer goods.
Supply chain issues were a key challenge for many retailers throughout 2021 and these challenges are expected to persist in 2022. Now there is another challenge...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.