Although the final weeks of 2021 will be remembered for the resurgence of the pandemic, driven by the new Omicron strain, the second half of the year marked the end of restrictions and the reopening of economies in many parts of the world.
What has become clearly apparent from analysis of the LexisNexis® Digital...
There’s no question 2021 was the year of vulnerabilities that drained already exhausted security operations teams. From pandemic fatigue to the exploitation of critical business services like Microsoft O365 by crafty threat actors, organizations of all sizes faced increased susceptibility to phishing attacks putting...
Phishing campaigns continue to evolve and innovate. If we learned anything from 2020, it’s that threat actors’ ability to quickly adjust their methods to world events can be lightning fast. From Emotet to Ryuk, and let’s not forget COVID-19, threat actors improved their methods and adapted to world events,...
The Cofense Intelligence™ team analyzes millions of emails and malware samples to understand the phishing landscape. In Q4 2021, we observed that malicious phishing campaigns increased, mainly due to the return of Emotet in early November. Campaigns delivering malware preferred keyloggers, with information stealers...
Ransomware is no longer just a single act of encryption. It has quickly grown into a multi-level attack. Even if you comply with ransom demands, you can suffer subsequent extortion, from threats to publishing sensitive data to DDoS attacks against your services.
Preventative cybersecurity is the best way to avoid...
The scary fact is that the majority of data breaches are caused by human error. With so many technical controls in place hackers are still getting through to your end users. How are they so easily manipulated into giving the cybercriminals what they want? Well, hackers are crafty. And the best way to beat them is to...
Everyone saw the Colonial Pipeline attack in the news media, and ever since ransomware has become a household word. Most people understand that ransomware involves black hats putting code on people’s computers that, once triggered, causes them to lock up, and some people even know that encryption is involved, but...
The battle against email-borne cyber threats continues. While vendors are hard at work building sophisticated email security controls intended to stop phishing tactics, attackers continue to prevail, evading even the most advanced analytics. New, innovative email security solutions that directly involve the end-user...
With uncertainty rampant, 2021 saw a rise in the volume, variety, impact, and sophistication of phishing attacks. As the pandemic rumbled on in the United States and elsewhere, and displaced employees were still trying to get a grip on their new lives, more opportunities arose for phishers to exploit the spaces...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.