How to deal with BEC attacks
Credit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read moreCredit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 16 Mar 2020 15:28:35 +0000
On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play’s poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints. Categories: Tags: becconfickercoronavirusfingerprint filesMSPphishing scamplay protectremoteskimmersmbv3spear phishing |
The post Lock and Code S1Ep2: On the challenges of managed service providers appeared first on Malwarebytes Labs.
Read moreCredit to Author: Alex Drozhzhin| Date: Wed, 05 Feb 2020 16:50:15 +0000
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Read moreCredit to Author: Jovi Umawing| Date: Thu, 07 Nov 2019 21:49:16 +0000
Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both. Categories: Tags: account takeoverACIDAgariAgari Cyber Intelligence DivisionATObecbusiness cyberattacksBusiness Email Compromisebusiness threatsNigerian scammerphishingSilent StarlingSocial EngineeringVECvendor email compromise |
The post Not us, YOU: vendor email compromise explained appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 14 Oct 2019 16:00:00 +0000
The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report. We highlight their key findings and remind readers how to better protect themselves. Categories: Tags: becBusiness Email Compromisechild sexual exploitationcseddoseuropolfraudinternet organized crime threat assessmentioctaphishingransomwarespear phishing |
The post Europol: Ransomware remains top threat in IOCTA report appeared first on Malwarebytes Labs.
Read moreCredit to Author: erinj| Date: Wed, 09 Oct 2019 13:45:45 +0000
In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. Trend Micro has built a formidable array of resources over the past few years to…
The post Tackling the BEC Epidemic in a New Partnership with INTERPOL appeared first on .
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 20 Sep 2019 01:27:41 +0000
Toyota’s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.
Read moreCredit to Author: William Tsing| Date: Mon, 09 Sep 2019 15:36:11 +0000
Before organizations engage in gnashing of teeth over the “ignorant user” and the cost of training, think about how much email users encounter and whether corporate communications look like phishes themselves. Categories: Tags: anti-phishingbecBusiness Email Compromisecorporate communicationsemail communicationsemailsphishingphishing trainingtraining and awareness program |
The post When corporate communications look like a phish appeared first on Malwarebytes Labs.
Read more