The "deliberate actions" of a now-fired senior engineer at Customer.io put at risk email addresses of six client companies, including NFT marketplace OpenSea. The email delivery vendor did not specify how many individuals are now at elevated risk of phishing attacks.
Business email compromise (BEC) is when threat actors use email fraud to attack organizations, deceiving people into doing something they believe is helping the company. To request funds from victims, BEC threat actors conduct a variety of scams impersonating coworkers, vendors, or customers.
Despite the...
Business email compromise (BEC) is when threat actors use email fraud to attack organizations, deceiving people into doing something they believe is helping the company. To request funds from victims, BEC threat actors conduct a variety of scams impersonating coworkers, vendors, or customers.
Despite the...
The past few years have shown us a tremendous shift in BEC attacks, which changed its strategies from Executive Impersonation to opting to impersonate third party vendors and suppliers instead. This shift has given the threat actors a plethora of additional trusted identities to exploit.
This Threat Intelligence...
Emails shared with NFT marketplace OpenSea were disclosed to an unauthorized external party, the company is warning patrons. Anyone who shared an email address should be on guard for phishing attacks. The cause was a rogue employee at a third-party email delivery vendor.
For the seventh year in a row, business email compromise produced the largest losses of any type of cybercrime, according to Steve Dougherty of the U.S. Secret Service. He says organizations need to build and maintain relationships with law enforcement agencies before an attack happens.
"Credential phishing is off the charts," says Tonia Dudley of Cofense. She discusses the challenge for organizations to strike a balance between having the right controls in place to block malicious emails and stopping the business from receiving legitimate emails.
Abnormal Security is out with new financial crimes research, and it
shows that traditional business email compromise is evolving into
new forms of financial supply chain compromise. Crane Hassold
shares insights on the crimes and how best to detect, deter and
respond to them.
In a video interview with Information...
Several major email breaches reported by healthcare entities in recent days and weeks have affected the health data of nearly 300,000 individuals. Experts say the incidents highlight the ongoing challenges many organization face involving phishing attacks and similar email compromises.
According to Gartner, continued increases in the volume and success of phishing attacks and migration to cloud email require a reevaluation of email security controls and processes.
Download the 2021 Gartner Market Guide for Email Security to learn:
What integrated cloud email security (ICES) solutions are and...
Abnormal Security is out with new financial crimes research, and it shows that traditional business email compromise is evolving into new forms of financial supply chain compromise. Crane Hassold shares insights on the crimes and how best to detect, deter and respond to them.
At the start of 2021, vaccine rollout let people imagine an end to pandemic disruption. But some of the world’s smartest cyber criminals weren’t interested in returning to business as normal. Over the first half of the year, a series of ransomware attacks on global infrastructure pushed cybersecurity to the top of...
Commercial banking fraud mitigation is experiencing a new level of interest from FIs as they try to combat escalating and highly sophisticated attack vectors from organized crime rings while also trying to stave off Fintechs encroaching into their territory.
By effectively leveraging the vast amount of data at...
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With 2020’s scramble to enable remote working fading from memory, securing hybrid setups in the long term presented a new and complex challenge.
At the same time, cybercrime went prime time. High-profile cyber-attacks...
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.