What does a successful compromise of an organisation's email system look like, and what can we do to protect ourselves? This talk will use real-life case studies from recent incidents to dissect the anatomy of a modern Business Email Compromise attack. Attend this session for expert insight on:
This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.
People cause data breaches when using email for a multitude of reasons. They might be tired, rushing or using a mobile device. Or they might be moving to a new job and feel a sense of ownership that entitles them to remove data from their current employer's network.
Yet at as people communicate and collaborate...
A global law enforcement operation has resulted in the arrest of 281 suspects allegedly involved in business email compromise scams. The announcement comes on the same day as the FBI's Internet Crime Complaint Center says that losses from BEC scams have hit $26 billion and are continuing to rise.
A new variant of the TrickBot banking Trojan is enabling attackers to conduct SIM swapping schemes against Verizon Wireless, Sprint and T-Mobile customers in the U.S., potentially paving the way for account takeover fraud, according to a report from Dell's SecureWorks division.
Eighty suspects, most of them Nigerian nationals, have been indicted on charges of running global business email compromise and romance scams that led to millions of dollars in fraud and allegedly involved a complex money-laundering operation.
Recently in the news, websites go down when a service provider has a problem.
Today's successful digital strategies should include a secondary DNS solution capable of providing your company and customers with:
Increased redundancy in the event of an outage
A separate DDoS protection strategy to defeat...
People cause data breaches every day. That simple statement hides layers of complexity, compliance issues, and stress for CISOs and their security teams. While we may be able to 'logically' explain malicious breaches by linking them to motivations such as financial gain, it's often more difficult to understand and...
A newly identified phishing campaign used Google Drive to help bypass some email security features as attackers attempted to target a company in the energy industry, security firm Cofense reported this week.
Read this report to understand Gartner's view on how the email security market has changed in recent years.
How the large-scale migration of email to the cloud, plus the increasingly sophisticated threat landscape requires a continuous adaptive risk and trust assessment mindset to protect sensitive data.
As email threats become more advanced, machine learning is being used to detect these attacks. Learn the latest about machine learning & how it is changing the threat landscape.
This session discusses:
How machine learning is being used to detect threats
Latest advancements in machine learning for cyber...
The reason social media platforms are so successful is because they tap into the human sense of needing to connect with others.
Depending on your organization's policies, there is a high likelihood your employees may be tapping into several social platforms throughout the workday, which can increase attack...
Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department. The report pinpoints which sectors are hardest hit by this type of fraud.