Gift Cards Requested in Two-Thirds of BEC Attacks, Report Reveals

A report revealed that scammers requested funds in the form of gift cards in two-thirds of business email compromise (BEC) attacks. For a phishing trends report from the Anti-Phishing Working Group (APWG), APWG member Agari examined thousands of BEC at… Continue reading Gift Cards Requested in Two-Thirds of BEC Attacks, Report Reveals

Targeted Attacks Part 1 – OSINT and Reconnaissance

In our August monthly episode we start our three part series on targeted attacks. In this episode we focus on OSINT (Open Source Intelligence) and reconnaissance techniques used by attackers in phishing and BEC (Business Email Compromise) attacks. Kyle… Continue reading Targeted Attacks Part 1 – OSINT and Reconnaissance

Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable

Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an email account belonging to someone else. Cybercriminals obtain stolen user credentials through trade or purchase on the dark web. Typically, the credentials … Continue reading Top 3 Reasons Gaps in Microsoft and Proofpoint Email Security Are Leaving Organizations Vulnerable

UK National Cyber Security Centre Warns Sports Organizations of Ransomware and BEC attacks

UK’s National Cyber Security Centre (NCSC) has issued a warning about the growing risks of sports organizations becoming valuable targets for ransomware attacks, phishing campaigns and Business Email Compromise (BEC). “We are urging sports … Continue reading UK National Cyber Security Centre Warns Sports Organizations of Ransomware and BEC attacks