Image-based phishing tactics evolve

While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of e… Continue reading Image-based phishing tactics evolve

Email security trends in the energy and infrastructure sector

In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security data… Continue reading Email security trends in the energy and infrastructure sector

Domains Once Owned by Major Firms Help Millions of Spam Emails Bypass Security

8,800 domains, many once owned by major companies, have been abused to get millions of emails past spam filters as part of SubdoMailing campaign.
The post Domains Once Owned by Major Firms Help Millions of Spam Emails Bypass Security appeared first on … Continue reading Domains Once Owned by Major Firms Help Millions of Spam Emails Bypass Security

Protecting against AI-enhanced email threats

Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals. Its ability to process large amounts of data and quickly generate results has contributed to its widespread adoption… Continue reading Protecting against AI-enhanced email threats

Protecting against AI-enhanced email threats

Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals. Its ability to process large amounts of data and quickly generate results has contributed to its widespread adoption… Continue reading Protecting against AI-enhanced email threats