June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

In June’s security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.

The post June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway appeared first on Security Intelligence.

Continue reading June’s Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

Goal! Spam Campaigns Capitalize on the World Cup Craze

IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.

The post Goal! Spam Campaigns Capitalize on the World Cup Craze appeared first on Security Intelligence.

Continue reading Goal! Spam Campaigns Capitalize on the World Cup Craze

Rancor Hackers Use PLAINTTEE and DDKONG Malware in Asian Attacks

The criminal collectives are becoming active against computer networks worldwide. Experts have detected a new wave of attacks that are being orchestrated by the Rancor hackers against various computers located in Asia leveraging the PLAINTEE and DDKONG… Continue reading Rancor Hackers Use PLAINTTEE and DDKONG Malware in Asian Attacks

CounterTack, Phishing Attacks, and Who Uses Flash? – Paul’s Security Weekly #563

In the Security News this week, Google Chrome has a critical vulnerability, Flash has another zero-day exploit, Colorado passes “most stringent” breach notification law, hackers hack a plane from the ground. Paul’s Suggested Stories Is Your SOC F… Continue reading CounterTack, Phishing Attacks, and Who Uses Flash? – Paul’s Security Weekly #563

Machine learning vs. social engineering

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Ju… Continue reading Machine learning vs. social engineering

4 Social Engineering Tricks That Fool Unsuspecting Employees

Explore some of the most common social engineering tricks used to fool employees into handing over access to sensitive data. These include phishing, tailgating and social media pretexting.

The post 4 Social Engineering Tricks That Fool Unsuspecting Employees appeared first on Security Intelligence.

Continue reading 4 Social Engineering Tricks That Fool Unsuspecting Employees

Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Email, coupled with reliable social engineering techniques, continues to be one of the primary entry points for credential phishing, targeted attacks, and commodity malware like ransomware and, increasingly in the last few months, cryptocurrency miners… Continue reading Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Social Engineering: A Trick as Old as Time

Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.

The post Social Engineering: A Trick as Old as Time appeared first on Security Intelligence.

Continue reading Social Engineering: A Trick as Old as Time

Five Surprising Reasons to Invest in Better Security Training

Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.

The post Five Surprising Reasons to Invest in Better Security Training appeared first on Security Intelligence.

Continue reading Five Surprising Reasons to Invest in Better Security Training

March Madness Phishing Threats: Why Are We Still Falling for Them?

March Madness is one of the most watched—and anticipated—events each year. And each year as March Madness approaches, cybersecurity experts warn about hackers who want to take advantage of the tournament’s popularity with phishing schemes and bogus we… Continue reading March Madness Phishing Threats: Why Are We Still Falling for Them?