The FBI is warning U.S. businesses to beware of business email compromise scams focused not just on creating fraudulent wire transfers, but also stealing personally identifiable information. Experts, however, are criticizing the FBI's alert as being too little, too late.
Cybercrime alert: In March, 93 percent of all phishing emails studied contained ransomware designed to forcibly encrypt PCs, says PhishMe chief operating officer Jim Hansen. In an interview, he offers insights on how to respond.
To paraphrase an old saying, a wall is only as
strong as its weakest point. When it comes
to system and data security, people are
often that point.
People are the last line of defense to prevent
unblocked attacks from clearing a path to
your systems and data. To serve that role
effectively, employees must be...
Business Email Compromise phishing attacks, including the recent surge of IRS W-2 scams, have never been more prevalent. Why? Because they work.
These attacks, which often impersonate company executives, are actively targeting organizations large and small. When successful, BEC attacks lead to large losses due to...
Just six months after law enforcement agencies coordinated a takedown to disrupt online banking credential theft linked to the banking Trojan Dridex, the malware has re-emerged with new attack tactics and new targets, researchers say. U.S. bank accounts and businesses are now primary targets.
The Verizon 2016 Data Breach Investigations report finds malware, ransomware and phishing attacks are more common than ever and creating even more damage. Organizations are continuing to get exploited via vulnerabilities that are months or even years old, forensics expert Laurance Dine explains in this interview.
Your people are now the primary exploit target. You need to protect them, the way they work, and identify assets and risks before you are compromised. With an increasing amount of sensitive and confidential information- and an expanding attack surface of devices, cloud apps, and mobile locations- you cannot afford to...
The threat landscape is always shifting, and impostor emails are on the rise. Carefully planned and researched, impostor emails target specific people in your company. Either you become
the target of this attack or you become the unwitting victim.
Learn how Proofpoint Email Protection allows you to quickly see,...
Reliable metrics convey the robustness of phishing and spear phishing. They've been compiled
by the Anti-Phishing Working Group (APWG), the global coalition of tech vendors, government and law
enforcement agencies and NGOs focused on the problem.
In the first three quarters of 2015, the number of unique phishing...
Last year, the information security community witnessed some of the world's most devastating data breaches resulting from deadly malware strains and carefully executed phishing attacks. PhishMe's research team spent the last 12 months compiling the latest phishing intelligence and malware trends into an executive...
PhishMe has been collecting and aggregating phishing threat and simulation data since the launch of the Simulator service in 2008. With this report, we hope to share our experiences and insights on employee behavior as it relates to the simulated phishing attack scenarios.
Download this report for an inside look at...
Identifying phishing emails doesn't have to be complicated, as most phishing emails share common characteristics that savvy readers can recognize. This infographic provides an overview of those tell-tale signs of a phishing email.
Download this infographic to explore 3 brief lessons where you'll learn...
MedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.
Verizon Enterprise Solutions, which regularly assists clients in responding to their data breaches, admits it's suffered its own breach. The breach of contact information reportedly affected 1.5 million business customers, who now face greater risk of phishing attacks.