2019 Phishing Trends & Intelligence Report: The Growing Social Engineering Threat

2019 Phishing Trends & Intelligence Report: The Growing Social Engineering Threat

| | PTI Report
Phishing has and will continue to be a threat to anyone connected to the web. This is a fact set in stone, and regardless of advancements in technology, social engineering will allow these attacks to continue to be successful ... Read More
5 Tips for Smarter Detection and Collection of Digital Risks

5 Tips for Smarter Detection and Collection of Digital Risks

Last month, our Director of Product Management, Cary Hudgins, discussed how to develop a digital risk protection plan for the modern enterprise. One of the many reasons why such a plan should be created is because, in today’s world, an enterprise organization’s digital footprint can be vast and will continue ... Read More
Romanian Vishing/SMiShing Threat Actors Plead Guilty

Romanian Vishing/SMiShing Threat Actors Plead Guilty

| | smishing, vishing
In May of 2018, we reported on three Romanian threat actors who were extradited to the U.S. for their involvement in a SMiShing and Vishing fraud scheme. At the time of reporting, the expected losses were listed around $18 million but have since risen to more than $21 million ... Read More
Less Than 3 Percent of ‘Collection #1’ Data Dump Passwords are Unique

Less Than 3 Percent of ‘Collection #1’ Data Dump Passwords are Unique

This month the largest recorded data dump in history, 87GB filled with passwords and user credentials, was made available. Dubbed Collection #1 consists of 1,160,253,228 unique combinations of email addresses and passwords. Though historic, there are two positive notes regarding this information: The first is that this data set was ... Read More
Social Risk Monitoring: All Press Good Press?

Social Risk Monitoring: All Press Good Press?

It happens on a daily basis, it’s even likely that at some point it happened to you: social media account takeovers. A quick Google search shows a new batch of celebrities, politicians, companies, and other high profile users becoming the victim of account takeovers on a weekly basis ... Read More
49 Percent of Phishing Sites Now Use HTTPS

49 Percent of Phishing Sites Now Use HTTPS

| | HTTPS
Since 2015 there has been a steady increase in threat actors’ use of SSL certificates to add an air of legitimacy to malicious websites. By the end of 2017 almost a third of phishing sites had SSL certificates, meaning their URLs began with HTTPS:// and (most) browsers displayed the all-important ... Read More
Users Failing Phishing Simulations? That’s ok

Users Failing Phishing Simulations? That’s ok

Phishing simulations come with a range of emotions for the users who interact with them. Some will simply ignore them, others may fail by clicking on a link or attachment, and for the well-trained, they may even report them. Even if there is a negative outcome, training leads and organizations ... Read More
Is it a Phish? Halloween Edition

Is it a Phish? Halloween Edition

| | Is it a phish?
To wrap up our Cyber Security Awareness Month activities we’re bringing back a crowd favorite, Is it a Phish? And since it’s Halloween, we, of course, had to find the scariest, most terrifying phishing examples we could drum up for our very special guest, T Rex ... Read More
Meet the Cyber Security Awareness Team: Dane

Meet the Cyber Security Awareness Team: Dane

In our ongoing contributions to Cyber Security Awareness Month today we’re launching a two-part series designed to introduce you to some of our team. For those who have been fortunate (unfortunate) enough to be on the receiving end of one of our phishing simulations, interacted with our microlearning modules, or ... Read More
Meet the Cyber Security Awareness Team: Kimber

Meet the Cyber Security Awareness Team: Kimber

In our ongoing contributions to Cyber Security Awareness Month today we’re launching a two-part series designed to introduce you to some of our team. For those who have been fortunate (unfortunate) enough to be on the receiving end of one of our phishing simulations, interacted with our microlearning modules, or ... Read More