Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

Spear phishing

Spear phishing: Why targeted email attacks are so hard to stop

https://www.csoonline.com/article/2124681/what-is-social-engineering.htmlWhere phishing attacks began as Nigerian prince scams in the mid-1990s, today they have morphed into well-researched and targeted campaigns that are both highly effective and incredibly difficult to stop.

Threat spotlight: Cybercriminals working hard to take over email accounts

Businesses in Singapore lost more than S$43 million to business email impersonation scams in 2017 alone, up from S$25 million lost in 2016. Most victims were businesses that were deceived with spoofed e-mails that closely resemble genuine e-mail addresses of business partners or contacts they knew. 

Spear phishing -- threat vectors highlight new realities

Not knowing when, where or how phishing and ransomware attacks might succeed in tricking end-users into downloading malware on to their endpoint devices and bypass perimeter defenses exacts a great toll on cybersecurity professionals. 

2018 cybersecurity predictions: Cutting-edge tools, tactics in play

2017 has seen major global cybersecurity threats and incidents, including Wannacry and NotPetya, leading to breaches of highly sensitive data of hundreds of millions records globally. Therein lies the question – Will we see even more cyberattacks in 2018? A handful of industry experts from Barracuda share their thoughts on the growing security challenges and technology developments they expect to see in the coming year.

1) Mass vs targeted ransomware
Eugene Weiss, lead platform architect, Barracuda

How to identify every type of phishing attack

How to identify every type of phishing attack

Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat.

Spear phishing for confidential data and mortgages – hooking a big one

Spear phishing attacks are increasing and people, businesses, and brands should be on high alert. A successful attack doesn’t require advanced hacking techniques, but rather gathering information about you that’s already posted online and spending five minutes to write a well-crafted email.

New spear phishing campaign uses multiple scripts to customize attacks on enterprises

New spear phishing campaign uses multiple scripts to customize attacks on enterprises

Cybersecurity researchers have recently uncovered a sophisticated spear phishing attack at a well-known enterprise that went undetected by existing security solutions.  

Cyberattack on German steel factory causes 'massive damage'

News

The hack is one of the rare examples in which a digital attack caused physical damage.

Advanced cyber attacks occur up to once every three minutes

Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy defenses up to once every three minutes, finds a new report.

Advanced cyber attacks occur up to once every three minutes

Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy defenses up to once every three minutes, finds a new report.