Business Email Compromise (BEC) is “one of the most financially damaging online crimes” according to the FBI. It is a cunning form of email impersonation that, when combined with human error, can be incredibly disruptive and damaging. Phishing and Account Takeover (ATO) attacks target employees and trick them into...
While security tools have become more adept at detecting payloads in emails, attacks that lack known indicators and rely instead on impersonation/social engineering tactics are successfully bypassing these traditional controls and reaching inboxes. If an organization’s email security controls are not effective...
While historically the origin of most business email compromise (BEC) attacks has been West Africa, residing in Nigeria certainly isn’t a requirement for BEC attackers. Indeed, the subject of this report is a sophisticated threat group based in Israel.
The group is unique in that they impersonate executives and...
Bots have become an important tool for modern cybercrime. A bot is used somewhere in the attack cycle in more than three-quarters of security incidents. HUMAN Security co-founder and CEO Tamer Hassan called account takeover "the gateway drug to all other forms of fraud and abuse."
As you undergo changes in your environment, including expanding to the cloud even more, your attack surface gets wider. And you still need to know what’s happening – everywhere, all the time.
Whether you’re new to the cloud or deep into your migration, the cloud is, well, cloudy. The fact is, keeping up with...
In today's development environment, securing web applications is crucial. Traditional application security testing techniques like DAST can be inaccurate and generate many false positives. Interactive Application Security Testing (IAST) offers a more advanced and accurate approach to testing application...
SaaS applications are typical in the modern hybrid workforce, but their adoption requires organizations to carry out a proper risk assessment of each third party SaaS application accessing the data in these environments.
Spin.AI released new findings analyzing risk from third-party SaaS applications and browser...
For the first time in its 17-year history, application security vendor Checkmarx will have a new leader. The company has tapped Sandeep Johri, the longtime chief executive at software testing vendor Tricentis, to serve as its new CEO less than two years after being acquired by Hellman & Friedman.
Watch this video to learn why it is critical, now more than ever, to invest in practical, hands-on training that will allow an organization as a whole to practice effective security protocols and equip them with the right knowledge, skills and tools to thwart new and emerging security threats.
Banking Trojans, ransomware, fake finance apps programmed to steal data - the cybercriminal cartels have become more punitive in 2023, escalating destructive attacks on financial institutions. This is just one key finding of the annual Cyber Bank Heists report by Contrast Security's Tom Kellermann.
RiskRecon, a Mastercard company that provides cybersecurity risk ratings to enable better third-party security risk management, recently studied the impact of destructive ransomware incidents and the unique tie between ransomware susceptibility and an organization's cybersecurity posture. Kelly White, co-founder and...
Today’s enterprises are facing tremendous pressure to modernize so they can unlock their capacity for better, more profitable customer experiences.
They’re being challenged to adapt their foundational revenue-generating, client-facing business processes to fully seize the potential of the moment. With the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.