Threat Intelligence Hub

Image of threat map for mobile devices

Popular Posts

Threat Intelligence Articles

Email Security, Threat Intelligence Hub

Detecting and Preventing a TA551 Email Spam Strike

TA551 email spam attacks are devious and very difficult to detect. Only in-depth analysis of the emails plus enhanced AV software has been able to defeat them. Key Points: Like a chameleon, a TA551 attack blends in with its surroundings, making it e…

Read More >

Brand Protection, Threat Intelligence Hub

How to Slam a Door on the Cutwail Botnet: Enforce DMARC

DMARC can help protect brands from email domain spoofing. The problem is that not enough organizations are enforcing on DMARC yet. Key Points: The Cutwail botnet continues to be very active and often spoofs the brands of well-known organizations via…

Read More >

Web Security, Threat Intelligence Hub

FireEye Attack Raises the Bar on Cyber Resilience for Everyone

Threat actors steal ‘white hat’ tools, but FireEye publishes countermeasures to help the cybersecurity community thwart their use. The cyberattack on FireEye, revealed earlier this week, elevates cyber risk for all organizations. But than…

Read More >

Email Security, Threat Intelligence Hub

Anatomy of a Sustained BEC Attack on Microsoft 365 Users

Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to divert $15 million, and then to prevent detection of their email compromise. Key Points: A recent global business email compromise campaign, now under investig…

Read More >

Email Security, Threat Intelligence Hub

Threat Intelligence Briefing: Pandemic Fallout Strains Cybersecurity and Resilience

All organizations’ cybersecurity resilience is in greater peril as the global COVID-19 pandemic continues to add to and reshape cyber risk. Key Points: Pandemic fallout such as businesses accelerating their cloud migrations, more work from hom…

Read More >

categories

Read More >

View More

Mimecast Discoveries