Select Page
Time to Discovery is a Security Pain Point

Time to Discovery is a Security Pain Point

A recent article on Dark Reading website discussing the amount of time it takes to discover, contain, and report breaches caught our attention. It cited four reports, two indicating a different amount of time from compromise to discovery for data breaches, one...
Malvertising Bypasses Security with Straight to Browser Attacks

Malvertising Bypasses Security with Straight to Browser Attacks

Malvertising has recently made headlines thanks in part to a large Easter attack by the eGobbler gang that struck in early April and primarily focused on U.S. and European countries. The eGobbler gang has a history of launching attacks just prior to major holidays....
4 Phishing Attack Techniques that Bypass or Defeat 2FA

4 Phishing Attack Techniques that Bypass or Defeat 2FA

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we shared that while 2FA is certainly a best practice for corporate network security, it mainly protects against phishing attacks aimed at credential stealing, and just like the best...
Credential Stealing Phishing Attacks Gaining Momentum

Credential Stealing Phishing Attacks Gaining Momentum

A growing and popular phishing attack is one designed to steal credentials – mainly login data that can be used to gain access to applications, networks, and ultimately valuable data. Man-in-the-middle (MiTM) attack is an example of a popular method hackers use to...
Must-See Webinar: Real-Time Phishing Threat Intelligence

Must-See Webinar: Real-Time Phishing Threat Intelligence

Social engineering is the malicious act of tricking or manipulating people into divulging something. Often, that ‘something’ is personal data in the form of bank accounts, login credentials, passwords, and other personally identifiable information (PII) that can be...
10 Steps Every Organization Should Take to Improve Cybersecurity

10 Steps Every Organization Should Take to Improve Cybersecurity

In a recent blog post – 9 Reasons Cyberattacks are So Successful – we shared some Osterman Research insights from a recent SlashNext sponsored whitepaper that highlights what makes cybercrime such an effective business venture. The phishing and malware attacks today...