Cyber Resilience Insights

SUBSCRIBE NOW

Email Security
Credential Theft via Email Phishing: Its Rise, Risks, and Solutions

Credential theft is rampant and dangerous—but you can protect your organization and … Read More >

Credential theft is rampant and dangerous—but you can protect your organization and users by taking steps to stop email phishing attacks and password reuse. Key Points: Credential theft continues at extremely high levels as malicious actors take advantage of users’ top concerns, such as… Read More >

Bill Camarda

by Bill Camarda

Contributing Writer

Posted May 21, 2020

Email Security
Making Sure Your Third-Party Email Services use DMARC

Third-party email services hel… Read More >

Third-party email services help businesses conduct essential communications. They may also open the door for malicious e… Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted May 20, 2020

Threat Intelligence Hub
Shoring Up Brand Protections in the Age of Domain Spoof…

Cybercriminals leverage the tr… Read More >

Cybercriminals leverage the trust and digital reputations that online brands have fostered to further their malicious em… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted May 19, 2020

Email Security
Why Government Organizations Need DMARC

Cybercriminals often spoof government email addresses. Enforcing DMARC can help government… Read More >

Cybercriminals often spoof government email addresses. Enforcing DMARC can help governments protect citizens—and workers—from malicious email impersonation attempts. Key Points: Governments increasingly rely on email to communicate with citizens, but many government organizations still … Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted May 15, 2020

Threat Intelligence Hub, Coronavirus
Threat Intelligence Briefing: Attackers Target Employees Returning to Work—and Increasingly Turn to Non-Traditional Atta…

Key Points: Attackers are shifting focus to target employees returning to work. Non-trad… Read More >

Key Points: Attackers are shifting focus to target employees returning to work. Non-traditional attack vectors, including vishing and deepfake audio, are on the rise. Mimecast detected a spike in attacks on healthcare organizations, with malicious actors seeking to exfiltrate research data as orga… Read More >

Sam Greengard

by Sam Greengard

Contributing Writer

Posted May 13, 2020

Email Security
Sharing Threat Intelligence Among Best-of-Breed Securit…

Cybersecurity tools need to sh… Read More >

Cybersecurity tools need to share threat intelligence, using open Application Programming Interfaces (APIs), to effectiv… Read More >

Mitch Wagner

by Mitch Wagner

Contributing Writer

Posted May 12, 2020

Popular Posts

Older Posts

Email Security

The Growing Risk of Gift Card Scams

Business email compromise (BEC) scams that involve gift cards usually aren’t very sophisticated—but employees often still fall for them. Key Points: Gift card scams are a growing form of business email compromise attack that thieves use …

Read More >

Threat Intelligence Hub

New Threat Intelligence Report: 100 Days of Coronavirus

The global spread of COVID-19 has created many new opportunities for threat actors since the novel coronavirus began gathering widespread attention at the end of 2019. To provide a clear picture of how malicious actors are exploiting those opportunit…

Read More >

Threat Intelligence Hub, Coronavirus

Be Aware: Tax Scam Season in the U.S. is Extended This Year

Tax scams appear every spring—but the threats will persist longer this year because the U.S. filing deadline has been extended to July 15, 2020. Key Points: Because tax filing deadlines have been pushed back this year due to the COVID-19 pande…

Read More >

Email Security

Business Email Compromise (BEC) Attacks: The Top Cause of Payment Fraud

Business email compromise was the #1 source of payment fraud attempts on U.S. organizations in 2019, according to the Association for Financial Professionals. Key Points: 75% of organizations suffered business email compromise (BEC) attacks last yea…

Read More >

categories

Read More >

View More

Popular Posts