Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Newly Updated Grandoreiro Banking Trojan Distributed Via Phishing Campaigns

Researchers at IBM X-Force are tracking several large phishing campaigns spreading an updated version of the Grandoreiro banking trojan. The criminal malware operation was disrupted by law enforcement in January 2024 but resurfaced in March with an expanded set of targets. The new version of the malware is targeting more than 1,500 banks in over sixty countries.

Cyber Insurance Claims Rise Due To Phishing and Social Engineering Cyber Attacks

New data covering cyber insurance claims through 2023 shows claims have increased while reaffirming what we already know: phishing and social engineering are the real problem. If you’ve read enough of my articles here, you already know my view is a bit skewed towards the need for organizations to be aware of the true dangers of email-based cyber attacks.

Dissecting a Multi-stage Phishing Attack.

Phishing is one of the most common forms of cyber attack that organizations face nowadays. A 2024 risk report states that 94% of organizations fall victim to phishing attacks, and 96% are negatively impacted by them. However, phishing attacks are not only growing in number but are also more sophisticated and successful. This is owing to the modern multi-stage phishing attack, which is common nowadays.

Balancing Trust and Control: Effective Phishing Protection Strategies

Discover why balancing trust and control is essential in cybersecurity. Our hosts discuss the complexities of protecting against phishing attacks, especially with advanced tools like ChatGPT that make scams harder to detect. Learn how combining trust with effective controls can help detect anomalies and safeguard your organisation against targeted attacks.

What Is Email Spoofing and How to Prevent it?

Manipulating email headers to mimic the sender’s address and make people think they’re communicating with someone they know. This is a brief definition of email spoofing, an infamous fraudulent technique that can cause harm to recipients and those whose electronic addresses have been compromised. Spoofing may happen to individuals and companies alike.

User Training vs. Security Controls: Who's to Blame for Phishing Attacks?

In this thought-provoking clip, the hosts debate whether security awareness training is enough to prevent users from falling for phishing scams or if stronger controls are necessary. Drawing on insights from a recent NCSC blog, they explore the ethical dilemma of assigning blame when users, despite training, click on malicious email attachments. Should the onus be on the end user, or is it a failure of security controls? Tune in to understand the complexities of balancing trust and control in cybersecurity.

FBI Warns of AI-Assisted Phishing Campaigns

The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve their social engineering attacks. “AI provides augmented and enhanced capabilities to schemes that attackers already use and increases cyber-attack speed, scale, and automation,” the FBI says.

How to Automate Phishing Analysis with Torq Hyperautomation

How to Automate Phishing Analysis with Torq Hyperautomation. Phishing analysis has never been easier with Torq Hyperautomation. We make it easy to automate phishing analysis using our phishing templates in our template library. If you’re an Outlook user, this one’s is for you! In this example, we'll show you how to monitor an Outlook mailbox for phishing via Graph subscription.

How Torq Hyperautomation Simplifies Phishing Analysis for SOC Teams

2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.

Best Practices - Email Security for Small Businesses

Cyber security for business email: Effective ways to protect your data and reputation Nine out of ten successful cyberattacks are launched by sending a phishing email. According to Statista, almost every third adult encountered some form of phishing attempt in 2022. In the US, this type of cybercrime remained the most prevalent in 2023.