Check Your Email Rules for Maliciousness
Email rules have been used maliciously for decades. Learn about email rules and what you need to do to defend your organization against their malicious misuse.
Email rules have been used maliciously for decades. Learn about email rules and what you need to do to defend your organization against their malicious misuse.
The last few months have been very busy for cyber attackers targeting the NHS, as the number of phishing emails reported within the NHS shows a continual barrage of attacks.
A Freedom of Information (FOI) request revealed that over 43,000 National Health Service (NHS) staff have had phishing emails slip through the cracks and into their inboxes in the past ...
A new phishing attack spotted in the wild by security researchers at Trend Micro demonstrates how compromised data in an initial cyberattack is purposed in subsequent attacks.
An ongoing criminal investigation highlights how classified documents stolen by Russian hackers from former U.K. trade minister Liam Fox may have been used to impact the British 2019 ...
“This is a historic shift to the global email threat landscape and portends new and sophisticated social engineering attacks that CISOs around the world must brace for now,” according to ...
Scammers are taking advantage of the prominent use of VPNs by remote workforces to send out this very topically relevant phishing email that just wants to steal your credentials.
In a step towards educating customers on why attachments and URLs are deemed “malicious”, Microsoft’s is set to augment its Advanced Threat Protection product in July.
Researchers at Lastline warn that attackers are increasingly utilizing Excel 4[.]0 macros to deliver malware while avoiding detection by security products. Excel 4[.]0 (XL4) macros were ...
Security experts warn that phishing attacks against home workers will rise.
Scary news stories in the headlines always bring out the bad guys looking to make a quick illegal buck.
Rudy Friederich, a KnowBe4 friend at Marshal Security LLC sent me the following interesting tips related to finding out if you are the victim of Business Email Compromise. He wrote:
Dealing with business email compromise (BEC) requires people, process, and technology. As we've noted before, the problem is growing. Harder to detect and evolving in sophistication, ...
We thought it was bad when we saw Cyren's recent analysis that 10.5% of bad emails made it through the filters. It could even be worse than that. "Mimecast's latest ESRA (email security ...
Do you know what's getting through your mail filters?
Our friends at Bleepingcomputer wrote: "A critical vulnerability affects hundreds of thousands of email servers. A fix has been released but this flaw affects more than half of the ...
Aggregated results show 10.5% average rates at which enterprise email security systems miss spam, phishing and malware attachments. Here is a summary of findings of email security systems ...