Five Types of Business Email Compromise Attacks and How to Prevent Them

Five Types of Business Email Compromise Attacks and How to Prevent Them

In a recent blog, we cited the Federal Bureau of Investigation (FBI) and its Internet Crime Complaint Center (IC3) latest 2022 report, which emphasized a steep and significant rise in Business Email Compromise ...

What You Need To Know About Phishing

Research found that more than 255 million phishing attacks occurred in 2022, that’s a 61% increase compared to 2021 ...

Data Exfiltration Prevention: A How-To Guide

The most common goal of malicious insiders is stealing (or data exfiltrating) sensitive data by copying, transferring, emailing, or printing it without authorization. Targeted data can include customer lists, source code, patent ...

Intellectual Property Breaches: A New Target for Cybercriminals

| | data exfiltration
Ransomware has forced business leaders to reevaluate the data they collect and process, it has also changed the dynamics of confidential data and intellectual property breaches in general. All data has value, ...

MSP’s the new attack target

| | data exfiltration
Cybercrime groups are beginning to specifically target managed service providers (Msp's) in order to gain access to their clients and users ...
API, ChatGPT, exfiltration API security Salt Security APIs social media

Data is Being Exfiltrated by Employees

An analysis of security breaches involving exfiltration of data by internal employees published today by CyberHaven, a provider of data protection tools, found that, on average, only 2.5% of employees exfiltrate data ...
Security Boulevard

Detecting Data Exfiltration – Why You Need the Right Tools

| | data exfiltration
Why is having the right tools for data exfiltration prevention so important? ...

5 Major Moments That Changed the History of Ransomware

| | data exfiltration
What lessons should businesses be taking from these five major ransomware attacks and variants of recent years? ...

Preventing Insider Threats: What Does it Take to Guard Against Data Exfiltration?

| | data exfiltration
The cost of insider threats to businesses is on the rise, so how can you prevent data being compromised by these actions? ...