"Credential phishing is off the charts," says Tonia Dudley of Cofense. She discusses the challenge for organizations to strike a balance between having the right controls in place to block malicious emails and stopping the business from receiving legitimate emails.
Phishing is no longer restricted to just emails. As attackers broaden their arsenal, businesses today also need to be on the lookout for impersonation attempts via SMS text messages or voice calls, says Roger Grimes, a data-driven defense evangelist at KnowBe4.
Based on the collected results, there was one major shift from last year’s report: Security. Security was selected by 27% of the respondents, which is an increase of 5% over last year.
Quality also saw an increase of 4% for a total of 25%. Both of these gains took away from safety, which saw a decrease of 9% over...
A single cybersecurity vulnerability can leave embedded systems defenseless to data breaches, cyberattacks, and other cyber incidents.
Unfortunately, cybersecurity vulnerabilities are an ever-present threat. In fact, according to embedded software industry experts, nearly 90% of all detected security holes can be...
Up to 90% of software security problems are caused by coding errors, which is why secure coding standards are essential.
There are several secure coding practices you can adopt. But, to write truly secure code, you need a secure coding standard.
Download this whitepaper to learn:
What are the secure coding...
Metric selection should be practical, realistic and pragmatic, taking into consideration the process in place. Additionally, the cost of gathering the metrics versus the benefit gained from them should be a factor in the selection.
Metrics can be produced at all stages of the software development cycle. Their use...
In 2021, check transaction volumes increased by 8%, while attempted fraud dollar value increased by 106% for checks *. Check fraud risk is not only alive and well, but a growing concern for Fraud Managers.
To combat check fraud, Financial Services Organizations (FSOs) need both external account verification tools...
For criminals looking to cash in, opportunities to commit fraud and other financial crimes have never been so plentiful. Advances in payment technology, such as transaction options like Venmo, WorldPay and AliPay such as those from Apple and Qiwi, always open doors to new risks.
The recent rise of cryptocurrency is...
This annual survey seeks to evaluate the current and projected impact of fraud on the finance and treasury environment. Practitioners from all industries are polled on their experiences with fraud and on the range of controls, safeguards and security practices employed to protect their financial assets and...
Commercial banking fraud mitigation is experiencing a new level of interest from FIs as they try to combat escalating and highly sophisticated attack vectors from organized crime rings while also trying to stave off Fintechs encroaching into their territory.
By effectively leveraging the vast amount of data at...
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Let’s face it: phishing threats are getting into your end users’ inbox.
Over 50% of phishing emails are bypassing existing email security EVERY month delivering phishing threats to tempt users to click and give up network or personal credentials, activate malware, or scams like business email compromise...
Learn the comprehensive approach to domain security through these 6 steps that businesses can employ today.
Download the whitepaper to learn:
The 6 best practice steps to protect your domain;
Different types of domain cyber-attacks;
How threat actors deploy phishing sites & why you need to know.
Police in Nigeria this week arrested a 37-year-old man who's been charged with masterminding "a criminal syndicate tied to massive business email compromise and phishing campaigns," Interpol says. But with known BEC losses last year exceeding $2.4 billion, will the arrest have a noticeable impact?
The new Expel Quarterly Threat Report provides data on what we’re seeing,
detection opportunities, and resilience recs to help protect your organization.
We’ll dive into the trends in this report, based on incidents the Expel security
operations center (SOC) team identified through investigations into...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.