Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign

Credit to Author: Eric Avena| Date: Mon, 14 Jun 2021 16:00:44 +0000

Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-based infrastructure to compromise mailboxes via phishing and add forwarding rules, enabling these attackers to get access to emails about financial transactions.

The post Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign appeared first on Microsoft Security Blog.

Read more

A Look Back at the 2018 Security Landscape

Credit to Author: Jon Clay (Global Threat Communications)| Date: Mon, 04 Mar 2019 15:00:20 +0000

Do you ever question the value of the mounds of data we all collect? We make a point to stop, analyze and share, especially because we know you might not have the time. So, I bring you our annual look back at the more interesting security events and trends seen last year. The report, Caught…

The post A Look Back at the 2018 Security Landscape appeared first on .

Read more

2019 Security Predictions Report Released

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 11 Dec 2018 13:05:01 +0000

What Makes For Really Good Security Predictions Each year Trend Micro releases its annual Security Predictions Report. Good security predictions are very difficult to develop, and companies and consumers need to be selective about the security advice they take. What makes a good security prediction? Four key aspects: 1. It is the prime directive that…

The post 2019 Security Predictions Report Released appeared first on .

Read more