Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence, social engineering, Threat Intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center revealed a flood of suspicious emails. The culprit? A brand-new cyberattack mimicking the notorious Black Basta group’s latest ... Read More
Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed a 98% increase in the use of DocuSign phishing URLs compared to all of September and October. In ... Read More
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Stephen Kowski | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, demonstrating how cybercriminals leverage trusted enterprise solutions to deceive even the most vigilant users. Let’s break down this ... Read More
Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email security measures amidst an ever-evolving threat landscape. With the proliferation of phishing attacks and ... Read More
Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email security measures amidst an ever-evolving threat landscape. With the proliferation of phishing attacks and ... Read More
CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
Stephen Kowski | | breaches, cisa, CrowdStrike, CTO Corner, General, Malware, malware attacks, Phishing, Phishing Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber attacks. CISA’s Key Warnings CISA emphasized several critical points in their alert: Threat actors are taking advantage of ... Read More
CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks
Stephen Kowski | | breaches, cisa, CrowdStrike, CTO Corner, General, Malware, malware attacks, Phishing, Phishing Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber attacks. CISA’s Key Warnings CISA emphasized several critical points in their alert: Threat actors are taking advantage of ... Read More
New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals
Stephen Kowski | | CloudFlare, credential stealing, cybercrime, data theft, financial breach, FishXProxy, Malicious Payloads, Phishing, phishing toolkit
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground. With its array of advanced features, FishXProxy dismantles the technical barriers traditionally associated with phishing campaigns, making it ... Read More
AI Everywhere: Key Takeaways from the Gartner Security & Risk Management Summit 2024
Stephen Kowski | | AI, CTO Corner, Gartner, generative AI, generative ai gen ai, Security and Risk Management
The Gartner Security & Risk Management Summit 2024 showcased the transformative power of artificial intelligence (AI) across various industries, with a particular focus on the cybersecurity landscape. As organizations increasingly adopt AI for innovation and efficiency, it is crucial to understand the opportunities and challenges that come with this technology ... Read More
Understanding Business Email Compromise (BEC)
What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use email to deceive and defraud organizations. Unlike typical phishing attacks that cast a wide net, BEC is highly targeted and often involves impersonating a trusted individual or entity to trick employees into ... Read More