4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and M… Continue reading 4 Phishing Protection Gaps that SEGs Cannot Address

Characteristics and Challenges of Advanced Persistent Threats (APTs)

Advanced Persistent Threat. In name alone it sounds ominous and for good reason. Advanced […]
The post Characteristics and Challenges of Advanced Persistent Threats (APTs) appeared first on Security Boulevard.
Continue reading Characteristics and Challenges of Advanced Persistent Threats (APTs)

C-Level Security Compliance – The Need for Communication and Automation

A recent Dark Reading article – The Real Reason Why the C-Suite Isn’t Complying […]
The post C-Level Security Compliance – The Need for Communication and Automation appeared first on Security Boulevard.
Continue reading C-Level Security Compliance – The Need for Communication and Automation

Healthcare Organizations Continue to be a Soft Target for Phishing Attacks

According to the U.S. Department of Health and Human Services Office for Civil Rights […]
The post Healthcare Organizations Continue to be a Soft Target for Phishing Attacks appeared first on Security Boulevard.
Continue reading Healthcare Organizations Continue to be a Soft Target for Phishing Attacks

FBI Alerts that 2FA is Bypassed by Phishing Attacks

The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to […]
The post FBI Alerts that 2FA is Bypassed by Phishing Attacks appeared first on Security Boulevard.
Continue reading FBI Alerts that 2FA is Bypassed by Phishing Attacks

10 New Approaches to Help Organizations Improve Phishing Security – Part Two

With a growing available attack surface and plenty of resources available via the dark […]
The post 10 New Approaches to Help Organizations Improve Phishing Security – Part Two appeared first on Security Boulevard.
Continue reading 10 New Approaches to Help Organizations Improve Phishing Security – Part Two

Malvertising on Legitimate Websites, Even The New York Times

Malvertising and phishing are not new. But using distributed ad networks to serve up […]
The post Malvertising on Legitimate Websites, Even The New York Times appeared first on Security Boulevard.
Continue reading Malvertising on Legitimate Websites, Even The New York Times

Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs

We recently came across an article at CSO online – 10 signs you’re being […]
The post Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs appeared first on Security Boulevard.
Continue reading Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs

Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing

As we’ve blogged about before, cybercriminals are increasingly leveraging legitimate commercial infrastructure sites to […]
The post Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing appeared first on Sec… Continue reading Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing

Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing

As we’ve blogged about before, cybercriminals are increasingly leveraging legitimate commercial infrastructure sites to […]
The post Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing appeared first on Sec… Continue reading Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing