How malicious email campaigns continue to slip through the cracks

In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have found that malic… Continue reading How malicious email campaigns continue to slip through the cracks

How CISOs tackle business payment fraud

In this Help Net Security video, Shai Gabay, CEO of Trustmi, discusses why payments are a source of cyber worry for CISOs. CISOs are worried about Business Email Compromise (BEC), cyber attackers’ use of AI, and securing the supply chain. These a… Continue reading How CISOs tackle business payment fraud

What are forms of "hidden tracking links" in email messages that collect data; activated by simply opening email?

The US Dept of Justice on Monday, March 25, 2024 announced Seven Hackers Associated with Chinese Government Charged with Computer Intrusions Targeting Perceived Critics of China and U.S. Businesses and Politicians It includes the following… Continue reading What are forms of "hidden tracking links" in email messages that collect data; activated by simply opening email?

Key MITRE ATT&CK techniques used by cyber attackers

While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&… Continue reading Key MITRE ATT&CK techniques used by cyber attackers

Email security trends in the energy and infrastructure sector

In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security data… Continue reading Email security trends in the energy and infrastructure sector