Lisa O'Reilly, Author at Security Boulevard
™

The Future of Browser Security Lies in AI and Machine Learning

With software becoming more secure and adept at defending against malware, the cyberattack threat environment has shifted towards phishing. But unlike in the past, where these attacks were predominantly email-driven, hackers are now focused on multiple channels such as mobile devices, apps, and web pages. Since phishing is a human ... Read More
Zoom Phishing Attack

Human Hacking and Multi-Channel Phishing is Surging

Human hacking is a modern way to think about phishing in its entirety, which is anything malicious that reaches a user to steal credentials, data, or financial information. By focusing on phishing as an email problem or a spam problem is giving hackers the upper hand. Today, only protecting email ... Read More

Social Engineering Threats Rose 270% in 2021 – Indicating a Shift to Multi-Channel Phishing Attacks as Apps and Browsers Move to the Cloud

Humans are the most vulnerable cybersecurity entry points into an organization. By moving completely to the cloud, apps and browsers are all humans need to communicate with work, family, and friends. In the Human Hacking report recently published by SlashNext Threat Labs, data shows phishing attacks rose 51% over 2020 (a record-breaking year), and ... Read More

Spear Phishing from Trusted Sites Bypassing SEGs 65% of the Time

The rise of well-crafted spear phishing is the leading factor in the success of phishing attacks in 2021. In an environment where cybercriminals use automation and AI to increase the likelihood of compromising a target, the once-reliable security strategies of Secure Email Gateways (SEGs), firewalls, and other anti-phishing protections are ... Read More
Ad Network Phishing Lure Page

Why Your Security Strategy Needs to Think More About the Browser to stop Ransomware

Cybercriminals are Open for Business and Ransomware is the Daily Special When it comes to spear-phishing and ransomware attacks, it’s time to think outside of the inbox and consider these (scary) facts: 80% of web application attacks result in credential stealing, Verizon 2021 DBIR (Data Breach Investigations Report) which is ... Read More
Phish Stories 5: The Security and Privacy Conundrum in a BYOD World

Overcoming the Corporate Security and Employee Privacy Challenge

| | remote working
The shift to remote working has blurred the lines between people’s business and personal lives. With more organizations adopting BYOD (bring your own device) policies, the challenge now is how to protect employees best as they access corporate resources while guaranteeing the privacy of their personal activities. This is the ... Read More

SlashNext Reinvents Incident Response with Cortex XSOAR

The current security landscape is filled with targeted attacks, including sophisticated phishing and spear-phishing campaigns, and as many threat actors as defenders. Beyond stealing credentials, attackers are interested in compromising systems and data to any advantage they can gain, and security teams are struggling to maintain organizational defenses in today’s ... Read More

A Swarm of Ransomware Attacks Highlights the Need for High-Quality Threat Detection at the Start of the Attack Chain

| | Phishing, Ransomware
Ransomware is insidious. It’s a treacherous and crafty way to terrorize individuals, communities, and businesses. It’s also an industry with multiple players, each playing a part in a chain that results in a big payday. Ransomware-as-a-Service (RaaS) groups like DarkSide, REvil, and others use automation, personal information, and the low ... Read More

BYOD Trends for Remote Workers -Finding the balance between security and privacy

The BYOD (Bring-Your-Own-Device) age has been around now for some time. The megatrends of remote work brought on by the pandemic have forced security professionals to sacrifice securing the endpoint with productivity overnight work from home policies on BYOD. Cybercriminals have taken advantage of the sudden shift with significant business ... Read More

Did One Phish Take Down a Pipeline?

What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with the Colonial Pipeline attack, Ransomware is the number one cybersecurity threat to organizations, but it’s also the number one security threat to humans. It impacts schools, medical centers, and communities. Phishing is the number one cause ... Read More