Security News > 2021 > February > IRONSCALES further improves ability to detect advanced and highly targeted phishing attacks
IRONSCALES announced new platform features as part of its new release to further improve the company's ability to detect advanced and highly targeted phishing attacks, especially those focused on credential harvesting and account takeover.
IRONSCALES unveiled improvements to its phishing awareness training module with the addition of a "One-click campaign" feature offering a more seamless process for security teams to test employees' individual phishing awareness via targeted simulations.
Following today's news, Themis, IRONSCALES' AI-driven virtual security analyst, can now automatically classify phishing attacks as varying types of scams, such as BEC payment, suspected VIP impersonation, suspected malicious payload, or financial frauds, and report that information to its back-end unified email security platform.
IRONSCALES customers report notable improvements in employee-reported suspicious emails around financial and credential harvesting through more frequent ad-hoc phishing awareness campaigns, which are now easier to execute than ever.
Not only does advanced training improve overall security posture, it also means security analysts will spend less time evaluating potential phishing attacks, chasing down false positives and other security concerns.
IRONSCALES helps where email security hurts the most, in the inbox, with advanced threat protection followed by a post-message delivery, detection and remediation.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/3IYpKWbsRes/
Related news
- DOJ, Microsoft seize 107 domains used in Russia's Star Blizzard phishing attacks (source)
- GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks (source)
- Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack (source)
- Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations (source)
- Windows infected with backdoored Linux VMs in new phishing attacks (source)