4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and M… Continue reading 4 Phishing Protection Gaps that SEGs Cannot Address

Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs

We recently came across an article at CSO online – 10 signs you’re being […]
The post Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs appeared first on Security Boulevard.
Continue reading Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs

Phishing C2 Callbacks – Your Organization Has Likely Already Been Compromised

Callbacks to command-and-control (C2) servers can be indicators of an early stage breach, or […]
The post Phishing C2 Callbacks – Your Organization Has Likely Already Been Compromised appeared first on Security Boulevard.
Continue reading Phishing C2 Callbacks – Your Organization Has Likely Already Been Compromised

Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations

Anyone who is looking for a new career opportunity should keep in mind that […]
The post Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations appeared first on SlashNext.
The post Employment Phishing and Social… Continue reading Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations

Flaw Reinforces Browser Extensions as Potential Attack Vector

We took notice a couple of weeks ago when it was reported that a […]
The post Flaw Reinforces Browser Extensions as Potential Attack Vector appeared first on SlashNext.
The post Flaw Reinforces Browser Extensions as Potential Attack Vector appear… Continue reading Flaw Reinforces Browser Extensions as Potential Attack Vector

Protecting Against Rising Phishing Attacks and the Human Element

We often say that when it comes to protecting an organization from cybersecurity threats, […]
The post Protecting Against Rising Phishing Attacks and the Human Element appeared first on SlashNext.
The post Protecting Against Rising Phishing Attac… Continue reading Protecting Against Rising Phishing Attacks and the Human Element

Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations

Anyone who is looking for a new career opportunity should keep in mind that […]
The post Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations appeared first on SlashNext.
The post Employment Phishing and Social… Continue reading Employment Phishing and Social Engineering Attacks Endanger Jobseekers and Organizations

Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks

Over the course of 2018 one industry that has been struck hard with cybersecurity […]
The post Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks appeared first on SlashNext.
The post Lack of Focus on Security Makes… Continue reading Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks

Weaponized Documents: It’s Just a Matter of Time Before One is Opened

Protecting the enterprise from today’s increasingly sophisticated threats such as fileless documents and PDF …
The post Weaponized Documents: It’s Just a Matter of Time Before One is Opened appeared first on SlashNext.
The post Weaponized… Continue reading Weaponized Documents: It’s Just a Matter of Time Before One is Opened

Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence

Phishing threats have transformed into sophisticated targeted attacks that go well beyond credential stealing. …
The post Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence appeared first… Continue reading Better Understand the Risk of Phishing Attacks – Join a Live Demo of Real-Time Phishing Threat Intelligence