

Peter Goldstein
CTO and Co-founderfeature_status*/ ?>
Valimail
Comments Dotted :
13
April 01, 2020
If successful, this can lead to account takeover, identity theft and other scams that may affect an individual for years to come.
It would not be a surprise if the breached data of 5.2 million Marriott International hotel guests was used by cybercriminals to commit effective phishing attacks. For attackers, knowing customers’ contact details, birthdays, and loyalty program information means their social engineering attacks can be highly tailored and therefore all the more convincing, especially if leveraging brand impersonation tactics.
Phishing campaigns often follow soon after breaches like this, targeting the.....Read More

March 11, 2020
This is a highly effective approach in blocking ransomware, BEC and countless other attacks.
Phishing is implicated in more than 90% of all cyberattacks, and it is the preferred vector used by the Ryuk ransomware that hit Durham City and the County of Durham computers and systems last week. One of the key ways governments can close the door against such attacks is to adopt industry best practices, including the Domain-based Message Authentication, Reporting and Conformance (DMARC) standard, a vendor-neutral authentication technology that allows organizations to protect their emailing.....Read More

March 06, 2020
T-Mobile’s breach is a clear example of how hackers can obtain a wealth of sensitive information just by compromising email accounts.
In an era when BEC attacks are proving to be a highly popular and effective attack method, these types of incidents are unfortunately far too common. T-Mobile’s breach is a clear example of how hackers can obtain a wealth of sensitive information just by compromising email accounts. With access to a plethora of personal data on past and current customers and employees, hackers can potentially trade this data for profit in dark web marketplaces, or use it to commit account takeover, identity.....Read More

February 28, 2020
Organizations need to focus on validating and authenticating sender identity.
The phishing scam impacting Corcoran’s company clearly debunks the myth that phishing emails are easy to spot. Many companies invest in employee security training to prevent this kind of attack. But as this incident proves, humans are not able to identify malicious emails reliably. Hackers leverage impersonation and heavily researched social engineering tactics to appear as trustworthy senders, and their fraudulent messages are often indistinguishable from legitimate ones. In fact, 83 percent .....Read More

February 20, 2020
In fact, users in the U.S. open 30% of phishing emails, and 12% of those targeted by these emails click.
Phishing is implicated in more than 90% of all cyberattacks, and this attack on a U.S. natural gas facility shows exactly why: Email is a highly effective attack vector. Many companies invest in security training to prevent these types of cyberattacks, but as a defense, this is not completely reliable. That’s because malicious actors often leverage impersonation and social engineering to appear as trustworthy senders to victims, making their fraudulent messages indistinguishable from.....Read More

February 14, 2020
The FBI found that the cost of BEC attacks reached $26 billion over a three-year period.
Contrary to popular belief, phishing emails are not always easy to identify. They do not always contain obvious typos, broken English or clearly come from unknown senders. Cybercriminals have become adept at crafting emails that are difficult to discern from legit messages that recipients receive daily, and even though many organizations invest in employee email security training to prevent these kinds of attacks, attackers continue to find success often through impersonation. In fact, 90% of.....Read More

February 13, 2020
In fact, 83 percent of phishing emails are brand or company impersonations.
The latest scam targeting Chase and American Express customers demonstrates how effective impersonation techniques can be in phishing attacks. In fact, 83 percent of phishing emails are brand or company impersonations. Playing on Chase and Amex users’ fears of someone abusing their credit card information, victims are more inclined to fall for the bait and input their highly sensitive information in a fake verification process. Doing so would allow cybercriminals to commit identity theft on.....Read More

December 13, 2019
To stop attacks like this, the first essential step is to prevent malicious emails.
This new global phishing campaign targeting government departments is a prime example of how sophisticated and convincing cybercrime tactics have become, especially phishing attacks. There is a common misconception that phishing emails are easy to identify, because they’ll contain spelling and grammar errors and are clearly not coming from anyone the recipient knows. The truth is, cybercriminals have become extremely adept at crafting emails that are indistinguishable from legitimate emails.....Read More

October 10, 2019
This incident demonstrates how healthcare organizations and other companies need email security systems.
Phishing attacks continue to be a leading cause of data breaches, as shown with the recent breach targeting Indiana-based Methodist Hospitals. In fact, spear-phishing plays a role in at least 90 percent of all cyberattacks and is a highly effective tactic leveraged by cybercriminals. Because medical records contain an abundance of personal information, including Social Security numbers, addresses, payment information, and insurance information, they are highly valuable on the dark web, allowing .....Read More

September 27, 2019
Email security solutions that focus on authenticating sender identity are critical to fostering an atmosphere of trust with email communication.
DoorDash’s data breach — which exposed names, email addresses, delivery addresses, order history, phone numbers, and hashed passwords — puts close to 5 million people at an increased risk for phishing attacks and other fraudulent activity. Cybercriminals can use this kind of data, in combination with effective and widely used email impersonation techniques, to send people especially convincing phishing emails. If successful, these phishing attacks can lead to account takeover, identity.....Read More
