In volume and complexity, phishing attacks are getting worse. Read why organizations expect AI to raise its anti-phishing game and also, take a look at the trend towards off-the-shelf malware (but don’t forget about custom varieties). Get ahead of the problem, download this eBook on phishing trends our experts anticipate. … [Read more...] about Six phishing predictions infographic
Intelligent Phishing Defense
Uncomfortable truth #1 about phishing defense
Part 1 of a 5-part series. The threat posed by phishing is not new. For many years, the media and research papers have been littered with examples of data breaches that have been traced back to phishing attacks. Organizations have attempted to tackle the threat through investments in next-gen technologies and increased employee awareness training. … [Read more...] about Uncomfortable truth #1 about phishing defense
Catching the elusive big phish – Part 2
Identifying and defeating the ubiquitous CEO Fraud phishing attacks isn’t easy. Sometimes it requires breaking lifelong habits. By Todd R. Weiss SECOND OF A TWO-PART SERIES In our first installment we looked at the basics of a business email compromise (BEC) attack, sometimes called CEO Fraud. Here we will delve deeper into what to do to stop such … [Read more...] about Catching the elusive big phish – Part 2
Cutting off phish heads
Phishing is more than just an inconvenient, low-level attack; it potentially could have devastating impact on a company. It is essential to understand why and how it happens in order to determine where the attack might have migrated in the system and what data it is after. Understanding the modus operandi of the attack is essential to know how to defend against it. Such … [Read more...] about Cutting off phish heads
Phishing reference guide
We hear a lot of talk about phishing and how that is a prime attack vector for malware and ransomware attacks. It’s also a great vector for social engineering and CEO Fraud. With all the anecdotal recommendations on how to defend against phishing, sometimes it can be difficult to separate proven strategies of phishing defenses from unconfirmed reports of how somebody, somewhere … [Read more...] about Phishing reference guide