August 2021 Security Intelligence Roundup: Pipeline Changes, Social Engineering and Software Supply Chain Attacks

Ransomware catches people’s attention in part because it feeds on emotion. People click on links without looking at them first, and this remains one of the most common vectors for attack. While it may seem like the internet is filled with the same advice over and over again, even the most attentive person can slip […]

The post August 2021 Security Intelligence Roundup: Pipeline Changes, Social Engineering and Software Supply Chain Attacks appeared first on Security Intelligence.

Continue reading August 2021 Security Intelligence Roundup: Pipeline Changes, Social Engineering and Software Supply Chain Attacks

Most Digital Attacks Today Involve Social Engineering

On May 14, the FBI marked a sobering milestone: the receipt of its six millionth digital crime complaint. It took just 14 months for the FBI’s Internet Crime Complaint Center (IC3) to reach its new threshold. Digital crime complaints are on the rise, and we have some ideas as to why. Check out what these […]

The post Most Digital Attacks Today Involve Social Engineering appeared first on Security Intelligence.

Continue reading Most Digital Attacks Today Involve Social Engineering

When ‘Later’ Never Comes: Putting Small Business Cybersecurity First

Small- and medium-sized businesses can be victims of digital attacks as much as global ones can. In fact, 88% of small business owners think they’re open to a cyberattack. In response, startups must allocate time and resources to getting the right small business cybersecurity measures, right? If only business realities were that simple. Let’s talk about […]

The post When ‘Later’ Never Comes: Putting Small Business Cybersecurity First appeared first on Security Intelligence.

Continue reading When ‘Later’ Never Comes: Putting Small Business Cybersecurity First

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

In a world in which bad news dominates, social engineering scams that carry a promise of good news can be incredibly lucrative for cyber criminals.  In one recent example, fraudsters set up a phony job posting using a real recruiter as the contact person for the hiring process. Applicants hoping for a chance at the […]

The post Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work appeared first on Security Intelligence.

Continue reading Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

Social Engineering: Watch Out for These Threats Against Cybersecurity Experts

Many of us remember our parents saying not to take candy from strangers. Today, we can apply a similar mindset to avoid social engineering.  Social engineering is the threat that keeps on coming back. Threat actors are learning to use even cybersecurity researchers’ best intentions against them. Let’s take a look at tactics threat actors use to target […]

The post Social Engineering: Watch Out for These Threats Against Cybersecurity Experts appeared first on Security Intelligence.

Continue reading Social Engineering: Watch Out for These Threats Against Cybersecurity Experts

Social Engineering And Social Media: How to Stop Oversharing

You’ve done your due diligence, practice good security hygiene and have the best security tools available. Now, your security posture is strong. But, your plan is only as good as your employees, and they may be letting you down when it comes to being ready for social engineering.   While employees clicking on phishing links still […]

The post Social Engineering And Social Media: How to Stop Oversharing appeared first on Security Intelligence.

Continue reading Social Engineering And Social Media: How to Stop Oversharing

Information Security in the Age of Disinformation

With so much disinformation being reported in the news and spread through social media, it’s hard for security professionals to know what to believe.

The post Information Security in the Age of Disinformation appeared first on Security Intelligence.

Continue reading Information Security in the Age of Disinformation