While historically the origin of most business email compromise (BEC) attacks has been West Africa, residing in Nigeria certainly isn’t a requirement for BEC attackers. Indeed, the subject of this report is a sophisticated threat group based in Israel.
The group is unique in that they impersonate executives and...
Email is your most essential business tool—and today’s top malware delivery vector. This vital communications channel has become fertile ground for today's most damaging cyber threats and all kinds of fraud. Because email threats inherently target people, an effective cybersecurity program focuses on people first....
Every year, threat actors look for new tactics to outwit victims and bypass defenses. And 2022 was no different. As businesses rolled out new security controls, cyber criminals found new, sophisticated ways to attack people.
In our ninth annual State of the Phish report, we dive deep into complex new techniques...
Frost & Sullivan has once again recognized Proofpoint as the market leader in growth and innovation in the global email security market.
Email is the No. 1 threat vector for cyber attacks. And email security vendors are enhancing their strategies and products to stay ahead of these threats. This report benchmarks...
Security researchers say a slight modification to a Microsoft Exchange zero day attack used by Russian state hackers can bypass a patch the computing giant introduced in March. Microsoft patched the modified attack during this month's dump of fixes, rating the bug as "important" but not "critical."
Business email compromise, end-user education, forensic archiving and recovery can be confounding to SMBs that lack the resources for a traditional secure email gateway. The rise of cloud-based email offerings means that SMBs can now get the same level of email protection without using a gateway.
2022 Threat Landscape has shown a lot of uniqueness compared to previous years. With increase in Nation State Attacks we are seeing the emergence of a new class of e-criminals who have access to new and sophisticated ways of creating revenues.
Download this E-Book and learn, the recent trends that have occurred...
The scary fact is that human error is a contributing factor in more than 90% of breaches, and even the world’s most successful organizations have significant weaknesses in their cybersecurity defenses. With so many technical controls in place hackers are still getting through to your end users, making them your last...
When you think of using biometric technology as part of your multi-factor authentication process, you assume these attributes are safe. Cybercriminals can’t hack your fingerprints, can they? The answer may surprise you!
Biometric attributes aren’t as safe as they once were. Cybercriminals are always coming up...
Microsoft 365 offers tiers of security features, but their email security capabilities may not be as robust as their popularity. Learn how Fortra Email Security can be deployed alongside Microsoft 365 to ensure your organization’s valuable information remains secure — whether it’s housed on-premise, in the...
Cybercriminals have been launching attacks against our people, networks, and services for decades with varying success. So, the need to realign our defences to meet the demands of evolving threats is nothing new.
CISOs have faced a broad and varied set of challenges in recent years. Remote environments, increasingly sophisticated threats and expanding supply chains are just some of the many concerns keeping them up at night.
High profile data loss events continue to make front page news, making data protection a top concern for organisations today. Traditional Data Loss Prevention tools were designed to stop well-meaning insiders from accidentally leaking data from an on-premises environment. However, with distributed work forces and...
Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s ubiquity and central role in the workplace also make it a prime target for cyber attackers—and often, the primary vector for compromising their victims. It's no wonder experts such as Gartner and Forrester recommend more...
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.