While security tools have become more adept at detecting payloads in emails, attacks that lack known indicators and rely instead on impersonation/social engineering tactics are successfully bypassing these traditional controls and reaching inboxes. If an organization’s email security controls are not effective...
Business Email Compromise (BEC) is “one of the most financially damaging online crimes” according to the FBI. It is a cunning form of email impersonation that, when combined with human error, can be incredibly disruptive and damaging. Phishing and Account Takeover (ATO) attacks target employees and trick them into...
While historically the origin of most business email compromise (BEC) attacks has been West Africa, residing in Nigeria certainly isn’t a requirement for BEC attackers. Indeed, the subject of this report is a sophisticated threat group based in Israel.
The group is unique in that they impersonate executives and...
Bots have become an important tool for modern cybercrime. A bot is used somewhere in the attack cycle in more than three-quarters of security incidents. HUMAN Security co-founder and CEO Tamer Hassan called account takeover "the gateway drug to all other forms of fraud and abuse."
As you undergo changes in your environment, including expanding to the cloud even more, your attack surface gets wider. And you still need to know what’s happening – everywhere, all the time.
Whether you’re new to the cloud or deep into your migration, the cloud is, well, cloudy. The fact is, keeping up with...
In today's development environment, securing web applications is crucial. Traditional application security testing techniques like DAST can be inaccurate and generate many false positives. Interactive Application Security Testing (IAST) offers a more advanced and accurate approach to testing application...
SaaS applications are typical in the modern hybrid workforce, but their adoption requires organizations to carry out a proper risk assessment of each third party SaaS application accessing the data in these environments.
Spin.AI released new findings analyzing risk from third-party SaaS applications and browser...
Never before have companies had the ability to reach so far and wide to gain new customers. Thanks to the internet, a business’ footprint knows no limits. Today, there are unprecedented opportunities to attract customers and boost revenues. Yet, onboarding customers is tricky and challenging. It’s critical to...
APIs are pivotal to digital business yet are inherently more difficult to secure as compared to legacy architectures with more predictable use cases, such as custom three-tier web stacks in the data center. APIs facilitate a decentralized and distributed architecture with endless opportunities for third-party...
For the first time in its 17-year history, application security vendor Checkmarx will have a new leader. The company has tapped Sandeep Johri, the longtime chief executive at software testing vendor Tricentis, to serve as its new CEO less than two years after being acquired by Hellman & Friedman.
Watch this video to learn why it is critical, now more than ever, to invest in practical, hands-on training that will allow an organization as a whole to practice effective security protocols and equip them with the right knowledge, skills and tools to thwart new and emerging security threats.
Banking Trojans, ransomware, fake finance apps programmed to steal data - the cybercriminal cartels have become more punitive in 2023, escalating destructive attacks on financial institutions. This is just one key finding of the annual Cyber Bank Heists report by Contrast Security's Tom Kellermann.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.