Stop Office 365 Credential Theft with an Artificial Eye

Credit to Author: Chris Taylor| Date: Tue, 25 Sep 2018 13:00:44 +0000

We all know that email remains by far the number one threat vector facing organizations today. Trend Micro blocked more than 20.4 billion threat in the first half of 2018 alone, nearly 83% of which were email borne. But there’s more: corporate email accounts have also become a key target for attackers in their own…

The post Stop Office 365 Credential Theft with an Artificial Eye appeared first on .

Read more

The many faces of omnichannel fraud

Credit to Author: Jovi Umawing| Date: Wed, 12 Sep 2018 15:00:00 +0000

There’s a new kind of fraud out there, and it’s after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.

Categories:

Tags:

(Read more…)

The post The many faces of omnichannel fraud appeared first on Malwarebytes Labs.

Read more

Sound, Fury, And Nothing One Year After Equifax

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 07 Sep 2018 12:00:34 +0000

One year ago today, Equifax suffered what remains one of the largest and most impactful data breaches in U.S. history. Last September, it was revealed that the personal information of 145 million Americans, almost 700,000 UK citizens, and 19,000 Canadians was stolen by cybercriminals. This information included names, addresses, birthdays, Social Security numbers, and—in some…

The post Sound, Fury, And Nothing One Year After Equifax appeared first on .

Read more

Stop Impersonations of Your CEO by Checking the Writing Style

Credit to Author: Chris Taylor| Date: Wed, 05 Sep 2018 19:25:23 +0000

If one of your employees receives an email that looks like it’s from the CEO asking to send sensitive data or to make a wire transfer, could that employee spot it as a fake based on how it is written? He or she may be so concerned with pleasing the CEO that they may urgently…

The post Stop Impersonations of Your CEO by Checking the Writing Style appeared first on .

Read more

Securing the Convergence of IT with OT

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 04 Sep 2018 10:00:00 +0000

The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well. Beginning with the network, IT and OT use different protocols. Within the OT world, vendors have created many proprietary…

The post Securing the Convergence of IT with OT appeared first on .

Read more

Explained: regular expression (regex)

Credit to Author: Pieter Arntz| Date: Fri, 31 Aug 2018 15:00:53 +0000

What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.

Categories:

Tags:

(Read more…)

The post Explained: regular expression (regex) appeared first on Malwarebytes Labs.

Read more