Once considered an enterprise problem, business email compromise is now hitting SMBs, who are far less prepared to recover from a large attack.
CEO fraud cost US businesses $1.7 billion in 2019. These are the tricks and scams that cause victims to transfer millions to hackers.
Pretexting is phase one of a social engineering attack. Learn the most common tactics for manipulating users.
When we land a new job, we’re eager to share the good news. From LinkedIn to Twitter, new hires will reveal their start date, job location (including relocation plans), and new position title. It’s everything [...]
When is the last time you scrutinized an email? From the sender’s name to the subject line, time stamp, salutation, body, and signature? If you’re like most busy working people, the answer is probably “never.” [...]
A major cyberattack against a large corporation leads to reputation damage, financial loss, customer churn, and lawsuits. Most large corporations, however, have the resources to recover from various types of email fraud. For small to [...]
The FBI’s latest Internet Crime Report (IC3) revealed that US victims lost more than $2.7 billion to internet crimes in 2018, bringing the four-year total to a stunning $7.45 billion. Email fraud led the pack [...]
Artificial intelligence (AI) is everywhere. Or is it? According to MIT Sloan Management Review, only one in 20 companies has extensively incorporated AI into their solutions. These numbers are surprising considering it seems every company claims to use AI. In many cases, this is little more than “AI-washing” of existing technologies to jump on the AI bandwagon. Still, cybersecurity companies are using AI in meaningful ways outside the marketing department.
In a new twist on payroll phishing, cybercriminals are launching direct deposit spear phishing attacks—and they’re going after HR.
SIEMs is intimately linked to the specific hierarchy of collection agents, the choice of priorities for the inspection of events and the weighting of anomalies. The work of administrators is essential to develop a system profile and to identify abnormal operating conditions. Indeed, a statistical correlation engine, even the most powerful, will not yield any usable results if the tool is not correctly calibrated.