What cybersecurity pros can learn from first responders

Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the […]

The post What cybersecurity pros can learn from first responders appeared first on Security Intelligence.

Continue reading What cybersecurity pros can learn from first responders

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. […]

The post Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It appeared first on Security Intelligence.

Continue reading Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

The Role of Marketing and PR in Incident Response

Responding to a cyber incident requires teamwork across departments and disciplines. Technical incident responders must work to halt incoming attacks while the communications teams develop a public response. Clear communication is essential.  Communication strategies differ before and after a cyber incident. The way a company approaches both is as important as incident mitigation itself. How […]

The post The Role of Marketing and PR in Incident Response appeared first on Security Intelligence.

Continue reading The Role of Marketing and PR in Incident Response

What is an Incident Response Professional?

As part of our ongoing series highlighting various roles in the cybersecurity industry, this article shines the light on the incident response professional. While there are many misconceptions surrounding the role, let’s examine a few frequently asked questions. How In-Demand is this Particular Role? Why?  Year after year, the story is the same: Cybersecurity jobs […]

The post What is an Incident Response Professional? appeared first on Security Intelligence.

Continue reading What is an Incident Response Professional?

Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

By Tej Tulachan The Cofense Phishing Defense CenterTM (PDC) has prevented a phishing attack that attempts to steal users’ Office365 credentials by luring them with a fake payment order attachment. Hiding a malicious re-direct within a html file, threat… Continue reading Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

By Tej Tulachan The Cofense Phishing Defense CenterTM (PDC) has prevented a phishing attack that attempts to steal users’ Office365 credentials by luring them with a fake payment order attachment. Hiding a malicious re-direct within a html file, threat… Continue reading Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

By Tej Tulachan The Cofense Phishing Defense CenterTM (PDC) has prevented a phishing attack that attempts to steal users’ Office365 credentials by luring them with a fake payment order attachment. Hiding a malicious re-direct within a html file, threat… Continue reading Threat Actors Use Bogus Payment HTML File to Scoot Past Proofpoint Gateway

You’ve Been Served: UK Scammers Deliver ‘Predator the Thief’ Malware Via Subpoena

By Aaron Riley Not even the halls of justice are immune from scammers. A new phishing campaign spoofing the UK Ministry of Justice has successfully targeted users with a subpoena-themed email delivering Predator the Thief, a publicly available informat… Continue reading You’ve Been Served: UK Scammers Deliver ‘Predator the Thief’ Malware Via Subpoena