AI-powered BEC Attacks Overruning Organizations Without AI Solutions
Avanan Blog
by Shira Landau
2w ago
What is a BEC Threat? Business Email Compromise (BEC) is a type of cyber threat that aims to manipulate people into acting in the interests of a cyber criminal. These threats often involve the impersonation of a trusted individual who appears to request sensitive information and/or the transfer of funds. These threats are among the most expensive types of threats to contend with, and cost businesses billions of dollars in clean-up costs each year. The Quiet Proliferation of BEC Threats Business Email Compromise (BEC) attacks are quietly proliferating in large-part due to developments in th ..read more
Visit website
SaaS companies spoofed in nearly undetectable new phishing campaigns
Avanan Blog
by Shira Landau
1M ago
EXECUTIVE SUMMARY: Software-as-a-Service platforms and their clients face an insidious type of phishing-based threat. Organizations that fail to get ahead of it can experience lasting consequences ..read more
Visit website
Relentless Cyber Security: Making Sense of the CrowdStrike Disruption
Avanan Blog
by Michael Hansen
1M ago
The recent global computer outage caused by a CrowdStrike update stands as a poignant reminder of the profound pressures faced by professionals in this field. While the immediate cause of the outage was reported as a "single content update" conflicting with the Microsoft operating system, leading to the infamous Blue Screen of Death (BSOD) for millions of systems worldwide, the deeper narrative underscores a critical issue: the relentless, unyielding battle against cyber threats and its toll on even the most skilled engineers. It is more than ironic when solutions become the cause of the very ..read more
Visit website
Latest Zero-Click Attack in Outlook Delivers Instant Malware
Avanan Blog
by John Macario
3M ago
Earlier this year, we reported on Zero-Click Attacks in Microsoft Outlook that could compromise a user without them taking any action. Cyber Security News recently reported a new version of this critical attack, designated as CVE-2024-30103 ..read more
Visit website
BEC 4.0: Business Communication Compromise 
Avanan Blog
by Jeremy Fuchs
3M ago
Microsoft Teams is a popular communication channel for many organizations.  ..read more
Visit website
The Evolution of QR Code Phishing: ASCII-Based QR Codes 
Avanan Blog
by Jeremy Fuchs
3M ago
Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code attacks.  ..read more
Visit website
What You Need to Know from the 2024 Verizon Data Breach Investigations Report
Avanan Blog
by Jeremy Fuchs
4M ago
The 2024 Verizon Data Breach Investigations Report (DBIR) is always one of the most hotly anticipated cyber security reports and this year it has been released chockful of insights.  ..read more
Visit website
Spoofing Shein for Credential Harvesting 
Avanan Blog
by Jeremy Fuchs
4M ago
Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads.   ..read more
Visit website
Attack Report: Custom QR Code Phishing Templates 
Avanan Blog
by Jeremy Fuchs
4M ago
QR Code phishing—or Quishing—has continued to be a hot topic in email security.   ..read more
Visit website
Override Microsoft's High Confidence False Positive Phishing
Avanan Blog
by Jeremy Fuchs
4M ago
Since our inception, we've prided ourselves on "catching what Microsoft misses." We scan every email that Microsoft lets through and give it a thumbs up or down, providing a critical second layer of security ..read more
Visit website

Follow Avanan Blog on FeedSpot

Continue with Google
Continue with Apple
OR