The Cofense Intelligence™ team analyzes millions of emails and malware samples to understand the phishing landscape. In Q4 2021, we observed that malicious phishing campaigns increased, mainly due to the return of Emotet in early November. Campaigns delivering malware preferred keyloggers, with information stealers...
Phishing campaigns continue to evolve and innovate. If we learned anything from 2020, it’s that threat actors’ ability to quickly adjust their methods to world events can be lightning fast. From Emotet to Ryuk, and let’s not forget COVID-19, threat actors improved their methods and adapted to world events,...
There’s no question 2021 was the year of vulnerabilities that drained already exhausted security operations teams. From pandemic fatigue to the exploitation of critical business services like Microsoft O365 by crafty threat actors, organizations of all sizes faced increased susceptibility to phishing attacks putting...
The number of major health data breaches posted to the federal tally so far in 2022 - and the total number of individuals affected by those breaches - has surged in recent weeks as reports of large hacking incidents continue to flow in to regulators.
Ransomware is no longer just a single act of encryption. It has quickly grown into a multi-level attack. Even if you comply with ransom demands, you can suffer subsequent extortion, from threats to publishing sensitive data to DDoS attacks against your services.
Preventative cybersecurity is the best way to avoid...
The scary fact is that the majority of data breaches are caused by human error. With so many technical controls in place hackers are still getting through to your end users. How are they so easily manipulated into giving the cybercriminals what they want? Well, hackers are crafty. And the best way to beat them is to...
Everyone saw the Colonial Pipeline attack in the news media, and ever since ransomware has become a household word. Most people understand that ransomware involves black hats putting code on people’s computers that, once triggered, causes them to lock up, and some people even know that encryption is involved, but...
With uncertainty rampant, 2021 saw a rise in the volume, variety, impact, and sophistication of phishing attacks. As the pandemic rumbled on in the United States and elsewhere, and displaced employees were still trying to get a grip on their new lives, more opportunities arose for phishers to exploit the spaces...
The battle against email-borne cyber threats continues. While vendors are hard at work building sophisticated email security controls intended to stop phishing tactics, attackers continue to prevail, evading even the most advanced analytics. New, innovative email security solutions that directly involve the end-user...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.