Asia's Source for Enterprise Network Knowledge

Friday, May 24th, 2019

phishing

Ingenious imitation, fake GDPR notices, phishing found in 120 million malicious emails targeting business

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Cybercriminals tried to use more tricks to reach businesses in 2018; with 120 million attempted attacks through malicious emails.

Report reveals substantial growth in phishing, cryptocurrency mining and BEC

Report reveals substantial growth in phishing, cryptocurrency mining and BEC

The threat landscape that has evolved heavily through both approach and tactics, according to Trend Micro Incorporated’s 2018 Security Roundup Report.

Multi-cloud security: Web app, API protection against phishing, fraud

A combination of app protection, network security, access controls, threat intelligence, and endpoint inspection shuts down phishing and fraudulent activities across heterogenous environments before they can exact a damaging toll on business.

Marriott data breach: Potential victims should assume the worst, take all necessary precautions

The potential fallout from the Marriott’s Starwood data breach should be alarming to anyone who has stayed at a Starwood property in the last four years. Not only are guests at risk for opportunistic phishing attacks, but targeted phishing emails are almo

At this point, however, it's unclear what level of exposure each individual victim has been subject to. Until then, all potential victims should assume the worst and take all necessary precautions to protect themselves from all manner of scams. 

Cylance researchers discover powerful new nation-state APT

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The new APT, dubbed White Company, is likely Middle Eastern, but shows fingerprints of U.S.-trained personnel.

 

Policy eliminates pre-emptive protection of internet infrastructure abuse

Policy eliminates pre-emptive protection of internet infrastructure abuse

ICANN’s Temporary Specification for domain name WHOIS data has eliminated interventions that previously allowed investigators to stop new cybercrimes while still in the preparatory stages.

How to protect yourself from cyberattacks – Understanding attackers’ motives

It may seem counter-intuitive to place the motives and methods of attackers on a pedestal, but there is immense value in doing so. Today’s threat landscape demands an ongoing role reversal; which is the ability and desire to emulate the thought process and real-world methodologies of attackers in order to gain visibility and an advantage over the countless “what-if” scenarios that we face.

How layered email security protects staff, data, reputation

As email threats continue to become more targeted, a multi-layered defense is critical in successfully protecting targeted employees, applications and data. 

Threat spotlight: Cybercriminals working hard to take over email accounts

Businesses in Singapore lost more than S$43 million to business email impersonation scams in 2017 alone, up from S$25 million lost in 2016. Most victims were businesses that were deceived with spoofed e-mails that closely resemble genuine e-mail addresses of business partners or contacts they knew. 

What are phishing kits? Web components of phishing attacks explained

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The notion of a phishing kit can be a bit confusing for those of us who don't deal with them on a regular basis. Here's a brief overview of phishing kits and how they work.