Jul 30

How to Prevent Data Breaches with Phishing Detection

General Cyber Intel

 

Image source: Thinkstock

We read so much in the news these days about the financial cost, brand erosion, and reputation damage that comes with data breaches at companies both large and small. In the midst of all the activity to make sure that your assets are as impenetrable as possible, people sometimes forget that one of the leading causes of breaches is a successful phishing attack against a company’s employees.

A phishing, or social engineering, attack is an attempt by a threat actor to acquire confidential information through any form of interaction with a victim. A form of phishing is spearphishing, which is when a hacker targets a specific individual – usually under the pretext that they have legitimate business to conduct – to acquire sensitive information from them or as a means to deliver malware that then enables the criminal to infiltrate the victim’s network. While, educating and training your employees to take caution with their online activities is one of the best ways to stop breach attempts, much more can be done to detect, or even block, phishing and spearphishing campaigns before they can do any damage.

Read more

Jul 28

Cyveillance Weekly Cyber Security Trends Report – July 28, 2015

General Cyber Intel

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Jul 27

Cyveillance Phishing Report: Top Targets – July 27, 2015

General Cyber Intel Phishing

 

Phishing Report: Top Targets

Week of July 19 – 25, 2015
Author: Robert McDaniel

07272015-top-phishing-targets

 

This week saw more than a 2% increase in phishing activity for the top 20 brands we’re tracking, grouped by industry. We saw a huge spike in phishing for Internet Content Providers (>460%), followed by Internet Software & Services (>30%), and Banking (>25%). The largest decreases in phishing activity were seen in Computer Software (>30%), followed by Internet Search & Navigation Services (>20%), and Storage & Systems Mgmt Software (>15%).

Read more

Jul 23

What You Need To Know About Ransomware and Exploit Kits

General Cyber Intel

 

ransomware exploit kits

After a brief lull, ransomware infections appear to be on the rise again. In June, there was a spike in Crypt-based infections, and security experts estimate one million systems have already been compromised.

By: Michael Perry

After a brief lull, ransomware infections appear to be on the rise again. In June, there was a spike in Crypt-based infections, and security experts estimate one million systems have already been compromised.

Ransomware is malicious code (malware) designed to limit or block access to a computer system until a sum of money is paid. Once the ransom is delivered, the victim receives a decryption key that unlocks their files. Anecdotal evidence suggests that decryption keys might be dispatched if the ransom is paid on time, but there is not guarantee that you will regain access to your files once the ransom demands are met. Ransomware is delivered via exploit kits, also known as exploit packs, through the use of web-based vulnerabilities, so anyone with unpatched vulnerabilities on their system is at risk. Adobe and Java are two of the most common culprits, but there are many others. Exploit kits use malicious advertising (malvertising) to inject malicious or malware-laden advertisements into legitimate online advertising networks or webpages as a means to deliver malicious code – or payload.

Read more

Jul 21

Cyveillance Weekly Cyber Security Trends Report – July 21, 2015

General Cyber Intel

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Jul 20

Cyveillance Phishing Report: Top Targets – July 20, 2015

General Cyber Intel

 

Phishing Report: Top Targets
Week of July 13 – 19, 2015
Author: Robert McDaniel

07202015-top-phishing-targets

 

This week saw more than a 5% increase in phishing activity for the top 20 brands we’re tracking. New entrants to list were brands from Financial Services and Energy/Environmental sectors. The biggest increases in phishing activity were in Computer Software (>150%)  and Internet Content Providers (>150%). Storage & Management Software followed with a >55% increase. The largest decreases in phishing activity were seen in Banking (>22%) and Electronic Payment Systems (>15%).

Read more

Jul 16

Is Your Social Media Profile Being Used to Profile You?

General Cyber Intel Social Media

icons-640402_640

By: Greg Ogorek

I always wonder what some job seekers are thinking when they post on their personal social media accounts that they’re looking for work. One posting that recently caught my eye was a friend of a friend who posted on Facebook that she was seeking a receptionist role, a position that carries a fair amount of responsibility and visibility at an organization. Her profile was wide open. One click and I was able to preview the personality that I would be hiring; with a few more clicks, I was able to see pictures of her with her dog and friends, see who her brother and sister were, and other personal details.

Although social media usage is near ubiquitous now for most Internet users – with more than two billion active accounts worldwide and growing – and is a common method for personal communication, marketing, brand promotions, and other activities, many people still don’t fully grasp the security implications of using these sites, and how it can impact things like job searches.

Read more

Jul 14

Cyveillance Weekly Cyber Security Trends Report – July 14, 2015

General Cyber Intel

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Jul 13

Cyveillance Phishing Report: Top Targets – July 13, 2015

Phishing

 

Phishing Report: Top Targets
Week of July 5 – 12, 2015
Author: Robert McDaniel

 

Phishing Report: Top 20 Targets

This week saw more than a 21% decrease in phishing activity for the top 20 brands we’re tracking, grouped by industry. The biggest increases in phishing activity were in eCommerce (>15%), followed by Computer Hardware (>5%). The largest decreases in phishing activity were seen in Internet Content Providers (>65%), followed by Computer Software (>40%), and Banking (>40%).

Read more

Jul 9

Cyveillance Weekly Cyber Security Trends Report: July 9, 2015

General Cyber Intel

 

cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Subscribe to Our Blog!

Join thousands of security professionals and get our latest blog content in your inbox.

Your information will never be shared.

×