Hundreds of Live Phishing Sites Menacing Amazon Prime Day Shoppers

This week, Amazon Prime Day prompted a big increase in phishing attacks, as reported by Threatpost and many other media outlets. Shoppers anxiously awaited the amazing offers and discounts revealed during the two-day sale, with bad actors lying in wait… Continue reading Hundreds of Live Phishing Sites Menacing Amazon Prime Day Shoppers

Phishing 2.0 is Here — Make Sure You’re Prepared

Phishing attacks aren’t limited to email anymore leaving cybercriminals an abundance of new threat vectors, such as SMS, social media, browser extensions to attack through actions such as credential stealing, rogue software, scareware, fake virus alert… Continue reading Phishing 2.0 is Here — Make Sure You’re Prepared

SMishing Attacks Masquerading as USPS and FedEx

The USPS SMishing attack is a fast-moving, constantly changing credential stealing, social engineering phishing campaign. SlashNext Labs first detected and blocked it in May 2020.
The post SMishing Attacks Masquerading as USPS and FedEx appeared first … Continue reading SMishing Attacks Masquerading as USPS and FedEx

BYOD Trends and Endpoint Security — What’s best for your organization?

The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of remote work brought on by the pandemic have influenced the phishing landscape with significant business impact. While it benefits companies to allow BYOD to r… Continue reading BYOD Trends and Endpoint Security — What’s best for your organization?

Phishing Attack Payloads Leaving Employees Vulnerable as Remote Work Trends Continue to Evolve

In recent years phishing has become the number one threat action over malware. Furthermore, recent workforce changes spurred by the pandemic has led to an exponential increase in phishing attacks. Employees are working from anywhere, using one device f… Continue reading Phishing Attack Payloads Leaving Employees Vulnerable as Remote Work Trends Continue to Evolve

It Takes 48 Hours to Catch a Phishing Threat?

Fast-moving threats are taking days to appear on VirusTotal and other leading threat feeds leaving the bad actors an eternity to wreak havoc on remote workers.
The post It Takes 48 Hours to Catch a Phishing Threat? appeared first on Security Boulevard.
Continue reading It Takes 48 Hours to Catch a Phishing Threat?

Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat management and incident response, t… Continue reading Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email.  They break down these phishing attack vectors in this way: Messaging – 17% Social Media – 16% Gaming… Continue reading Going Beyond Awareness Training to Protect Mobile Devices from Phishing