Security News > 2023 > February > Cybercriminals exploit volatile job market for targeted email attacks

Between July-December 2022, the median open rate for text-based business email compromise attacks was nearly 28%, according to Abnormal Security.
"Human beings are relatively easy to manipulate, and employers' expectations regarding the ability of the average employee to identify these modern attacks are far too high. It is much safer to prevent a threat from reaching an employee's inbox than to rely on them to try to detect these sophisticated attacks on their own," Hassold continued.
"Email is undeniably the most common channel for asynchronous communication. And as our collective dependence on email has increased over the past two years, its popularity as an attack vector has also grown," said Mike Britton, CISO at Abnormal Security.
"One of the biggest challenges with email attacks is that your employees have to be correct every time whereas threat actors only have to be successful once. While educating employees about potential threats can certainly help reduce the risk of them engaging with a malicious email, the most effective way to prevent attacks is by investing in an email security solution that ensures threats are never delivered in the first place," Britton continued.
As cybercriminals continue to see success, email threats will only increase in volume and sophistication.
To stay one step ahead, enterprises need a cloud email security solution that blocks attacks before they reach employee inboxes.
News URL
https://www.helpnetsecurity.com/2023/02/09/cybercriminals-exploit-job-market-targeted-email-attacks/
Related news
- How cybercriminals exploit psychological triggers in social engineering attacks (source)
- PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks (source)
- Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials (source)
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil (source)
- Craft CMS RCE exploit chain used in zero-day attacks to steal data (source)
- Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics (source)
- Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks (source)
- Cybercriminals exploit AI hype to spread ransomware, malware (source)
- China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil (source)