social engineering attacks
The Threat Detection Deficit – Microsoft Office 365 ATP Raises the Stakes
Lisa O'Reilly | | APT, Phishing, Phishing Attacks, phishing threat detection, phishing URL, phishing URL analysis, real time phishing threat intelligence, social engineering attacks, threat detection
A recent Dark Reading article, based on IRONSCALES’ research, found that Microsoft Office 365 […] ...
How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure
Lisa O'Reilly | | Phishing Attacks, phishing emails, real time phishing threat intelligence, social engineering attacks, targeted phishing defense, Threat Intelligence, URL filtering, URL filtering tools
In a recent blog we discussed Why Organizations Need to Take Phishing Threats Against […] ...
4 Infamous Social Engineering Attacks That Real-Time Protection Would Have Stopped
Lisa O'Reilly | | Phishing, Phishing Attacks, phishing threats, phishing URL, real time phishing threat intelligence, social engineering attacks, Zero-hour phishing threats
Threat actors are constantly evolving their methods to go after the human attack surface […] ...
A Phishing Protection Protocol that Covers 6 Non-Email Attack Vectors
Lisa O'Reilly | | Phishing, phishing attack, Phishing Attacks, phishing threat prevention, phishing threats, phishing URLs, real time phishing threat intelligence, social engineering attacks
The evolution of phishing attacks over the past couple of years has shown a […] ...
Cybersecurity Defenses Improve Against Email Phishing, But Not All Phishing Attacks
Lisa O'Reilly | | cybersecurity defense, Phishing, Phishing Attacks, phishing threat, real time phishing threat intelligence, social engineering attacks
Earlier this year a whitepaper from Osterman Research – Addressing the Top 10 Security […] The post Cybersecurity Defenses Improve Against Email Phishing, But Not All Phishing Attacks appeared first on SlashNext ...
Flaw Reinforces Browser Extensions as Potential Attack Vector
Lisa O'Reilly | | browser extension, exploiting browser extensions, Exploits, phishing attack, phishing attack vectors, phishing threat intelligence, real time phishing threat intelligence, social engineering attacks
We took notice a couple of weeks ago when it was reported that a […] The post Flaw Reinforces Browser Extensions as Potential Attack Vector appeared first on SlashNext ...
C-Level Suite is a Growing Target for Social Engineering Phishing Attacks
Lisa O'Reilly | | Exploits, Phishing Attacks, phishing defense solution, phishing threat intelligence, real time phishing threat intelligence, social engineering attacks, zero-hour threats
The 2019 Verizon Data Breach Investigations Report came out last month and provided us […] The post C-Level Suite is a Growing Target for Social Engineering Phishing Attacks appeared first on SlashNext ...
Demo of New Automated Phishing Attack That Hacks Two-Factor Authentication
Lisa O'Reilly | | anti-phishing specialist, Exploits, Phishing, phishing attack, Phishing Attacks, phishing detection, real time phishing threat intelligence, social engineering attacks, social engineering threats, two factor authentication, zero-hour phishing attacks
We’ve written several blogs this year about the pros and cons of two-factor authentication […] The post Demo of New Automated Phishing Attack That Hacks Two-Factor Authentication appeared first on SlashNext ...
Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks
Lisa O'Reilly | | breaches, Cybersecurity, Phishing Attacks, phishing threat, phishing threat intelligence, real time phishing threat prevention, social engineering attacks, zero-hour phishing threat prevention
Over the course of 2018 one industry that has been struck hard with cybersecurity […] The post Lack of Focus on Security Makes Healthcare Industry a Target for Phishing Attacks appeared first ...
Time to Discovery is a Security Pain Point
Lisa O'Reilly | | Exploits, Phishing, Phishing Attacks, phishing threat intelligence, phishing threats, real time phishing threat intelligence, social engineering attacks, targeted phishing defense
A recent article on Dark Reading website discussing the amount of time it takes […] The post Time to Discovery is a Security Pain Point appeared first on SlashNext ...