Online attack threats continue to intensify, with criminals preferring ransomware, DDoS attacks and business email compromises, warns Europol, the EU's law enforcement intelligence agency. After numerous successful disruptions by police, criminals have responded by launching increasingly complex attacks.
Ransomware, business email compromises and the malicious insider threat: These are the three top concerns of Canadian attorney Imran Ahmad as he looks ahead to the cybersecurity legal landscape in 2020.
A newly discovered cybercriminal gang is putting a twist on business email compromise scams by initially targeting vendors or suppliers with phishing emails and then sending realistic-looking invoices to their customers, according to the security firm Agari, which labels the approach "vendor email compromise."
Account takeover continues to be a
lucrative path for fraudsters across all
industry sectors. But Scott Olson of
iovation says there are different levels of
defense that can be deployed, based on
the risk of specific types of transactions.
Download this eBook to learn more about:
The different manifestations...
You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates, but...
Barracuda is out with its latest Spear Phishing Update, and among the key findings: a rise in email account takeover and lateral phishing. Why are enterprise defenses failing to detect these strikes? What new solutions will improve defenses? Barracuda's Michael Flouton shares insights.
What does a successful compromise of an organisation's email system look like, and what can we do to protect ourselves? This talk will use real-life case studies from recent incidents to dissect the anatomy of a modern Business Email Compromise attack. Attend this session for expert insight on:
Current attack...
This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.
People cause data breaches when using email for a multitude of reasons. They might be tired, rushing or using a mobile device. Or they might be moving to a new job and feel a sense of ownership that entitles them to remove data from their current employer's network.
Yet at as people communicate and collaborate...
A global law enforcement operation has resulted in the arrest of 281 suspects allegedly involved in business email compromise scams. The announcement comes on the same day as the FBI's Internet Crime Complaint Center says that losses from BEC scams have hit $26 billion and are continuing to rise.
Account takeover (ATO) attacks result in billions of dollars of fraud and damage to brand reputation each year. These are the costs and risks associated with ATO.
A new variant of the TrickBot banking Trojan is enabling attackers to conduct SIM swapping schemes against Verizon Wireless, Sprint and T-Mobile customers in the U.S., potentially paving the way for account takeover fraud, according to a report from Dell's SecureWorks division.
Eighty suspects, most of them Nigerian nationals, have been indicted on charges of running global business email compromise and romance scams that led to millions of dollars in fraud and allegedly involved a complex money-laundering operation.
Recently in the news, websites go down when a service provider has a problem.
Today's successful digital strategies should include a secondary DNS solution capable of providing your company and customers with:
Increased redundancy in the event of an outage
A separate DDoS protection strategy to defeat...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.