Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Falcon for Mobile Unlocks New Mobile Security Options for SMBs

Small and medium-sized businesses (SMBs) increasingly rely on mobile technology to drive efficiency and stay competitive. However, the use of mobile devices introduces security risks that SMBs must address. Recognizing this, CrowdStrike Falcon for Mobile now offers iOS unmanaged support, extending robust security to devices without the cost and complexities of traditional mobile device management (MDM). Let’s take a closer look.

Phishing With Deepfakes for HK$200 Million

My hacker story occurred not too long ago at the Hong Kong office of an undisclosed multinational corporation. The hackers pulled off a first-of-its-kind scam that leveraged a phishing email as the initial attack vector followed by a deepfake video call. In this instance, there was enough information to establish a perceived authority for a finance worker who transferred a total of HK$200 million in 15 transactions to five different Hong Kong bank accounts until the scam was detected.

Cybercriminals Use New V3B Phishing Kit to Mimic 54 Different Banks in the European Union

A new phishing-as-a-service toolkit that leverages credential interception and anti-detection capabilities has put EU banks at severe risk of fraud. One of the growing dangers of the cyber crime economy is the phishing toolkit. Putting well-designed, expertly-coded webpages, authentication services, and obfuscation features into the hands of even a would-be cybercriminal creates havoc for the intended victim organizations.

HIPAA Email Security: A Guide for Healthcare Organizations

This article is a must-read guide on email security in healthcare. It analyzes the regulatory complexities of HIPAA, outlines practical strategies for secure communications, and sheds insights into why your healthcare organization may need to take action. By the end of reading this guide, you’ll be able to make informed choices regarding your email practices.

8 Steps to Navigating Cybersecurity Data Compliance

Cybersecurity compliance is complicated. As industry standards change and evolve with new technology, so do compliance requirements. Depending on your organization’s operations, industry, or even location, compliance could mean adhering to multiple frameworks and reporting to multiple governing bodies. In fact, 67% of organizations surveyed by Arctic Wolf follow between one to three sets of guidelines.

Securing Docker Containers: Strategies to Prevent Commando Cat Attacks

Cybercriminals have been exploiting misconfigured Docker containers to deploy cryptocurrency mining software, and a particularly aggressive campaign dubbed "Commando Cat" has been at the forefront since early this year. This trend highlights the growing threat of cryptojacking through container misconfigurations. How Cybercriminals Exploit Docker Containers Containers have revolutionized how organizations deploy and manage applications, but they have also provided new opportunities for cyberattackers.

Cost, convenience, and compliance: The value for insurers of the Forrester Total Economic Impact Study

The growing sophistication of threat actors, supply chain disruptions, and the potential for systemic and catastrophic losses make for a precarious landscape for insurers and those seeking insurance. To help customers reduce risk at scale, insurers and brokers must adopt technology in order to visualize vulnerabilities while also forecasting, quantifying, and monitoring risks.