A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense…
Advanced Persistent Threats (APTs) are sophisticated, often multi-component network attacks that, by definition, often go undetected for quite some time.
Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated.
SlashNext is honored to make our first appearance at the final conference and will be showcasing Threat Intelligence, Incident Reporting, and Phishing IR solutions at booth #17 September 6-8.
Just how prevalent are these phishing callbacks and C2 infections? In every client install we perform – 100 percent! – we see C2 infections and callbacks. Are you compromised?
Even though browser extensions act like web applications they aren’t always bound by the SOP that normally prevents web apps from accessing data from other web applications.
If your employees are using the corporate network as a launching point for career change, they are opening the organization (and themselves) to potential phishing sites and links that can cause damage.
This year’s Verizon Data Breach report showed that social engineering threats that are targeting the C-suite were up 12-fold over 2018 levels.
The healthcare industry is particularly susceptible to phishing attacks as we’ve seen in the past. Here’s why and what can be done to minimize this risk.
Most traditional cybersecurity systems today are just too slow when it comes to detecting threats, and that discovery deficit can exacerbate phishing threats to organizations.