Using Artificial Intelligence to Catch Sneaky Images in Email

Using Artificial Intelligence to Catch Sneaky Images in Email

These days, email security is more critical than ever. With the rise of sophisticated cyber threats, attackers are constantly evolving their techniques to bypass traditional security measures. One such method is the use of image-based fraud, which can be particularly challenging to detect and prevent. The challenge of image-based fraud Have you ever received an email from a service you don’t remember signing up for? Or perhaps an email that seems legitimate but feels off?…

Read More

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Check Point’s Harmony Email & Collaboration team detected over 5,000 emails disguised as Microsoft product notifications, which could lead to email extortion, the cybersecurity company said on Oct. 2. The emails stand out for their polished appearance and the inclusion of legitimate links. The announcement comes as part of Cybersecurity Awareness Month, highlighting the ongoing risks posed by phishing attacks. Email scam campaign stands out for polished appearance The emails come from “organizational domains impersonating…

Read More

Email Attacks a Problem for National Infrastructure Companies

Email Attacks a Problem for National Infrastructure Companies

Cyber attackers are repeatedly using malicious emails to infiltrate critical national infrastructure. Up to 80% of CNI companies experienced an email-related security breach in the last year, according to a new report from security solution provider OPSWAT. Compromising CNI, like utilities, transport, telecommunications, and now data centres, can lead to widespread disruption, making it a prime target for cyber attacks. A recent report from Malwarebytes found that the services industry is the worst affected by…

Read More

Email obfuscation tactics elude security protections

Email obfuscation tactics elude security protections

Cyber attackers have used email obfuscation techniques for decades to conceal malicious code or data within a file, script or network traffic. There are many email obfuscation methods, such as putting addresses into images, captchas or texts that bots cannot read. Such traditional email obfuscation tactics are well known, and security controls have historically been good at patching and stopping them. But recently our threat researchers have uncovered some newly evolving techniques that are designed…

Read More

In the last year, 70% of organizations were targeted with BEC attacks

In the last year, 70% of organizations were targeted with BEC attacks

A report by Arctic Wolf shows that business email compromise (BEC) incidents are a common occurrence, as 70% of organizations experienced an attempted attack in the last year. 29% of these organizations became victims of one or more successful BEC attacks. The report also discussed ransomware. 45% of the respondents state that their organization experienced a ransomware incident in the last 12 months, with 86% of those incidents involving successful data exfiltration.  Among organizations that…

Read More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

The Federal Bureau of Investigation and Cybersecurity & Infrastructure Security Agency warned in a joint advisory about a threat actor deploying a botnet that makes use of the Androxgh0st malware. This malware is capable of collecting cloud credentials, such as those from AWS or Microsoft Azure and more, abusing the Simple Mail Transfer Protocol, and scanning for Amazon Simple Email Service parameters. What is the Androxgh0st malware? The Androxgh0st malware was exposed in December 2022…

Read More

February 1, 2024: A Date All Email Senders Should Care About

February 1, 2024: A Date All Email Senders Should Care About

For any organization sending bulk email or high email volumes to Google and Yahoo accounts, there’s one date you should have flagged on your calendar. On February 1st, guidance indicates you’ll need to pay attention if you are sending over 5000 emails a day into Google and Yahoo mailboxes. So, What Is the Issue? On that day, any email domain sending more than 5000 emails on a daily basis will need to meet a minimum…

Read More

Fighting the dark side of generative AI

Fighting the dark side of generative AI

Fighting the dark side of generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Stay ahead of the cybersecurity cat and mouse game

Stay ahead of the cybersecurity cat and mouse game

Stay ahead of the cybersecurity cat and mouse game | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Top 10 risky behaviors of employees uncovered

Top 10 risky behaviors of employees uncovered

Top 10 risky behaviors of employees uncovered | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3