Intelligence & Analytics August 24, 2017 Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks 3 min read - By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Advanced Threats August 21, 2017 All in a Spammer’s Workweek: Where Do the Busiest Spammers Work Around the Clock? 5 min read - According to recent IBM X-Force data, spammers and spam botnets typically work the same hours we do to maximize their returns.
Fraud Protection August 17, 2017 Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security 3 min read - To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
August 8, 2017 Global Spam Rate Reaches Highest Level in Two Years 2 min read - In July, the global spam rate reached the highest level researchers had observed since March 2015, likely due to a rise in self-spreading email malware.
August 8, 2017 Speared! Malicious Emails Phish Up Russian Enterprise Backdoors 2 min read - A new spear phishing campaign leverages a series of malicious emails to target and compromise Russian-speaking enterprises via hidden backdoors.
July 31, 2017 How to Shake the Hook After a Phishing Attack 2 min read - Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
July 25, 2017 Bugging Out: Fruitfly Malware Swarms MacOS Users 3 min read - A new strain of FruitFly malware has infected hundreds of users, possibly over the last 10 years. The malware is insidious, spying on MacOS users.
July 25, 2017 New Emotet Trojan Feature Spreads Malware on Internal Networks 2 min read - Researchers discovered a new variant of the Emotet Trojan that spreads across internal networks and serves as a downloader for other banking Trojans.
July 20, 2017 Google Adds Verification Screens for Plugins Following Phishing Attacks 2 min read - Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due diligence.
Identity & Access July 12, 2017 Outsider or Insider: Who Will Cause Today’s Data Breach? 2 min read - Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.