There are plenty of phish in the digital sea, and attackers are constantly looking for new bait that helps them bypass security perimeters and land in user inboxes. Their newest…
Browsing CategoryPhishing
The Role of Finance Departments in Cybersecurity
Consumers are becoming more aware of the data companies collect about them, and place high importance on data security and privacy. Though consumers aren’t aware of every data breach, they…
What is Reverse Tabnabbing and What Can You Do to Stop It?
Tabnabbing is a phishing method in which attackers take advantage of victims’ unattended browser tabs. After hijacking an inactive tab and redirecting it to malicious URLs, an attacker can perform…
Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023
Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis…
Detecting the Undetected: The Risk to Your Info
IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are…
Detecting the Undetected: The Risk to Your Info
IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are…
Breaking Down the Seven Steps of an SQL Injection Kill Chain
Cyberattacks can cause immense damage to an organization’s system and have only increased in frequency over recent years. SQL injection is an especially devastating example. This form of attack involves…
Avoid Being a Downstream Victim of Service Provider Attacks
Attacks on service providers are mounting — and so are downstream victims. Earlier this year, some customers of the cloud service provider DigitalOcean received emails instructing them to reset their…
What CISOs Should Know About Hacking in 2023
The art of cyber crime is in a constant state of flux and evolution. Simply staying on pace with these trends is a significant part of the CISO’s job. Today’s…
Why Crowdsourced Security is Devastating to Threat Actors
Almost every day, my spouse and I have a conversation about spam. Not the canned meat, but the number of unwelcomed emails and text messages we receive. He gets several…