phishing threats

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence, social engineering, Threat Intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...

New Age Phishing Threats and How to Plan Ahead
Ahona Rudra | | advanced phishing threats, Cybersecurity, phishing cyber threats, phishing threats, threats of phishing
These new age phishing threats utilize sophisticated tactics like social engineering, which make them challenging to detect and mitigate ...
BYOD Trends and Endpoint Security — What’s best for your organization?
The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of remote work brought on by the pandemic have influenced the phishing landscape with significant business impact. While ...
Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder
Lisa O'Reilly | | automating URL analysis, Incident Response, Phishing, phishing C2s, Phishing Incident Response, phishing threats, SOAR solutions, URL analysis and enrichment
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat ...
Going Beyond Awareness Training to Protect Mobile Devices from Phishing
Lisa O'Reilly | | Browser Phishing Protection, Endpoint security, Mobile Phishing Protection, Mobile Security, Phishing, phishing attack vectors, Phishing Attacks, phishing threats, smishing
According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in this way: ...
5 Ways URL Analysis and Enrichment Benefits Managed Service Providers
Lisa O'Reilly | | Cybersecurity, enterprise cybersecurity, enterprise SOCs, phishing IR, phishing threats, social engineering, Threat Hunting, Threat Intelligence, URL analysis, URL scanning
Researching URLs in suspected phishing incidents is a costly and time-intensive process, according to a survey* of 300-plus security decision-makers. Nearly half of all survey respondents (47%) reported spending up to 10 ...
Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions
Lisa O'Reilly | | automating URL analysis, Incident Response, Phishing, phishing C2s, Phishing Incident Response, phishing threats, SOAR solutions, URL analysis and enrichment
The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat ...