Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Phishing to Malware: How to Defend Against a Modern Kill Chain

Every day, threat actors devise new plans for breaking into secure systems. The steps they take, from researching a target to carrying out the attack, are known as the cyber kill chain. Traditionally, that kill chain has targeted devices and networks that lie completely within your organization’s control. For better or worse, mobile and cloud-based work have upended that dynamic.

Phishing Attacks Impersonating Big Brands Starts to Zero in on Just One Brand

The latest data on brand phishing trends shows one brand dominating quarter over quarter, but also continuing to take on a larger share of the brand impersonation. Take a guess which brand tops the list as the most impersonated in phishing attacks? If you guessed Microsoft, you’d be right. You’d also have been right last quarter, and the quarter before that – according to Check Point Research.

CISA Strongly Recommends Phishing-Resistant MFA

We are excited to see the Cybersecurity Infrastructure Security Agency (CISA) and outgoing Director Jen Easterly strongly recommend PHISHING-RESISTANT multi-factor authentication (MFA). The majority of people, including the majority of cybersecurity practitioners, do not know that most MFA…especially the most popular types used today (e.g., one-time passwords, pushed-based, SMS-based, etc.), can be as easily phished or bypassed as the passwords they were intended to replace.

U.K. Residents are Victims of the Latest Phishing Scam Targeting Starbuck Customer Credentials

Analysis of a new phishing attack highlight just how easy it can be to spot these kinds of attacks if recipients were properly educated. Action Fraud, the U.K.’s national fraud & cyber reporting center, recently warned U.K. residents of a scam impersonating Starbucks.

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors. In our previous blog, we explored the appeal of these platforms and discussed various major phishing kits today. In this two-part blog, we'll focus on a phishing kit named ‘Rockstar 2FA’ that is linked to widespread adversary-in-the-middle (AiTM) phishing attacks.

Email Security Limitations of Microsoft 365 Defender

We probably do not need to cover this, but we’ll provide a quick overview – M365 has a host of advantages, including scalability and convenience. Because the platform is cloud-based, businesses can effortlessly access their data and applications and shift to fully remote or hybrid working models without the common challenges of such a transition.

Breakdown of Takedown: An Overview of Tackling Phishing Threats

Every year, more and more companies are confronted with website and email spoofing worldwide. Cyber criminals use fake websites and fake email accounts for phishing, spear phishing and social engineering attacks to commit fraud, redirect web traffic, or manipulate search engine rankings. The disarming, or takedown, of these fake domains is a real challenge for more and more security teams. This is because cyber criminals are becoming increasingly professional in their spoofing activities.

Cybersecurity in Gaming: protecting players and virtual assets from growing threats

Cybersecurity is becoming a critical necessity in today's world, where technology is used in virtually every aspect of life. Every year, the number of cyberattacks grows, and the methods of attackers are becoming more sophisticated. Protecting personal data, financial information and corporate secrets requires reliable technologies and increased attention from users. The gaming industry is also an important area that needs protection.