Russian “Troldesh” AKA Encoder.858 or Shade is back!

Posted by: Dilen Thakuri, Cofense Phishing Defense Center On the 19th of April, the Cofense Phishing Defense Center received an email crafted to appear to be from “Sberbank Russia.” In fact, it was a phishing email containing the Troldesh malware, a va… Continue reading Russian “Troldesh” AKA Encoder.858 or Shade is back!

5 ways we boost your anti-phishing program’s ROI.

If you’re shopping for a vendor to help with phishing awareness training, you might be thinking, “They all seem pretty similar. What’s the difference?” Fair enough. There are plenty of options in computer-based security awareness. In sorting through th… Continue reading 5 ways we boost your anti-phishing program’s ROI.

How to Avoid Drowning in Spam and Phishing Emails

As we have continued to improve anti-phishing capabilities for clients over the past few years, we have seen a myriad of changes in phishing email composition, style, and approach. Throughout all those changes however, one thing has remained the same. … Continue reading How to Avoid Drowning in Spam and Phishing Emails

How to Avoid Drowning in Spam and Phishing Emails

As we have continued to improve anti-phishing capabilities for clients over the past few years, we have seen a myriad of changes in phishing email composition, style, and approach. Throughout all those changes however, one thing has remained the same. … Continue reading How to Avoid Drowning in Spam and Phishing Emails

Their email filters missed these threats. Good thing the users didn’t.

By Jerome Doaty, Zakari Grater, and Brenda Gooshaw Samson Technology is an important part of any phishing defense, especially perimeter tech designed to filter emails. But these systems, even those billed as “next-gen email security platforms,” don’t c… Continue reading Their email filters missed these threats. Good thing the users didn’t.

Examples of Silver-bullet Technology Fails

Most security teams today are pretty much in the same boat: limited budget, limited man power, and limited time to defend their network against escalating threats and attacks.  Perhaps that’s why so many information security vendors claim to have the “… Continue reading Examples of Silver-bullet Technology Fails