real time phishing threat intelligence

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence, social engineering, Threat Intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...
4 Phishing Protection Gaps that SEGs Cannot Address
Lisa O'Reilly | | Phishing, Phishing Attacks, phishing site detection, phishing threat intelligence, phishing threats, real time phishing threat intelligence, real-time phishing protection, Threat Intelligence, zero hour phishing site detection
A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between ...
C-Level Security Compliance – The Need for Communication and Automation
sln_admin | | C-level security compliance, Cybersecurity Automation, Phishing, phishing defense, phishing threats, real time phishing threat intelligence, social engineering
While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity automation be the answer? ...
Healthcare Organizations Continue to be a Soft Target for Phishing Attacks
sln_admin | | healthcare security, Phishing, Phishing Attacks, phishing security, phishing URLs, real time phishing threat intelligence, targeted phishing defense
The 2019 data breach numbers for the healthcare industry drive home both the lack of focus on phishing security and the obvious need for it ...
FBI Alerts that 2FA is Bypassed by Phishing Attacks
sln_admin | | bypass 2FA, Malware, Phishing, Phishing Attacks, phishing detection, phishing types, real time phishing threat intelligence, Threat Intelligence
The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to phishing attacks and two new hacker tools that can bypass two-factor authentication ...
10 New Approaches to Help Organizations Improve Phishing Security – Part Two
sln_admin | | anti-phishing technology, improve phishing security, Network Security, Phishing, Phishing Attacks, phishing security, real time phishing threat intelligence, social engineering, targeted phishing defense, Threat Intelligence
Here are the remaining 5 new approaches for helping organizations improve their phishing security. The threat landscape is changing… are you? ...
10 New Approaches to Help Organizations Improve Phishing Security – Part One
sln_admin | | Network Security, Phishing, Phishing Attacks, phishing security, real time phishing threat intelligence, targeted phishing defense, today’s security threats
Here are the first 5 of 10 new approaches for helping organizations improve their phishing security. Come back for the remaining 5 in a future blog post ...

Malvertising on Legitimate Websites, Even The New York Times
sln_admin | | malvertising, Malvertising attacks, Phishing, phishing defense, phishing site, phishing threat, phishing URL, real time phishing threat intelligence, targeted phishing defense, Threat Discovery
SlashNext recently discovered a new malicious phishing URL distributed through Google ads being served on the The New York Times website ...
Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs
sln_admin | | Phishing, phishing defense, phishing threat intelligence, real time phishing threat intelligence, social engineering, social engineering attacks, social engineering scams
Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated ...