Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Email Should Be Your No. 1 Security Priority

Gateway to Sensitive Information Email serves as a gateway to a treasure trove of sensitive information. It is where individuals and organizations share confidential documents, financial data, personal details, and much more. In the wrong hands, this information can be exploited for financial gain, identity theft, or even corporate espionage. Protecting this valuable data is paramount, and email is the first line of defense. Pervasive Attack Vector.

[HEADS UP] If You're a LastPass User, You May be the Next Phishing Email Target

Cybercriminals are not holding back on LastPass users as a new phishing campaign has recently launched with the intent to steal your data. The first portion of the campaign is a phishing email that asks you to verify your personal information by clicking on a link. The messages launch in waves with several attempts to impersonate LastPass.

Ethical Phishing: Testing Your Employees

The Rationale Behind Ethical Phishing Simulation Phishing attacks continue to be a primary vector for cybercriminals seeking unauthorized access to a company’s systems and data. These attacks are becoming increasingly sophisticated, making it crucial for organizations to educate their workforce about the dangers they pose. Ethical phishing tests are designed to mimic real-world phishing scenarios.

What are AI Phishing Attacks?

What are AI Phishing Attacks? AI phishing attacks, also known as AI-powered phishing or AI-driven phishing, are sophisticated cyberattacks that leverage artificial intelligence and machine learning algorithms to craft and execute highly convincing phishing attempts. These attacks are designed to deceive individuals or employees into divulging sensitive information, such as login credentials, financial details, or personal data. How Do AI Phishing Attacks Work?

MFA Defenses Fall Victim to New Phishing-As-A-Service Offerings

ZeroFox warns that phishing-as-a-service (PhaaS) offerings are increasingly including features to bypass multi-factor authentication. “In 2023, ‘in-the-middle’ techniques are some of the most frequently-observed methods used to gain access to MFA-secured networks,” the researchers write. “They enable threat actors to intercept or bypass MFA protocols by stealing communications without the victim’s knowledge.

New Wave of Hospitality Phishing Attacks: Compromise User Credentials, Then Go Phish

The hospitality sector is seeing a new wave of phishing attacks. These new attacks are more plausible because they begin with compromised credentials and move to fraudulent emails sent from within a trusted network. The compromised systems are legitimate booking sites; the victims are the guests. Akamai, which has described the trend, outlines a three-step attack chain.

How To Spot Phishing Emails

Phishing emails have traditionally been easy to spot by looking for signs such as misspelled words and unsolicited links and attachments. Although phishing emails are not a new occurrence, they have become a part of our daily lives. With the advancement of technology, however, the cybercriminals behind these phishing emails now have developed new ways to scam their victims. Regardless of these advancements, there are still ways to protect yourself from phishing emails.

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together Cloudflare Email Security and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.

Vanishing Act: The Secret Weapon Cybercriminals Use in Your Inbox

Researchers at Barracuda describe how attackers use legitimate email inbox rules to control compromised accounts and evade detection. “In order to create malicious email rules, the attackers need to have compromised a target account, for example, through a successful phishing email or by using stolen credentials seized in an earlier breach,” the researchers write.