Security News
Mimecast released the Threat Intelligence Report: Black Hat U.S.A. Edition 2020, which presents insights gleaned from the analysis of 195 billion emails processed by Mimecast for its customers from January through June 2020. The majority of attacks seen by Mimecast during this period were simple, high volume forms of attacks, such as spam and phishing that is likely a reflection of the ease of access to tools and kits available online.
Former UK trade minister and current Conservative MP Dr. Liam Fox has been named as the source of hacked trade documents released during last year's British elections. A report from Reuters cited two anonymous sources who say that the 58 year-old Fox, who has since stepped down, had an email account taken over by Russian hackers, who then used it to obtain and release documents about Anglo-American trade talks.
In 1965, Gordon Moore published a short informal paper, Cramming more components onto integrated circuits. Based on not much more but these few data points and his knowledge of silicon chip development - he was head of R&D at Fairchild Semiconductors, the company that was to seed Silicon Valley - he said that for the next decade, component counts by area could double every year.
The majority of state and local election administrators have only rudimentary or non-standard technologies to protect themselves from phishing. Fewer than 3 out of 10 election administrators have basic controls to prevent phishing.
The report reveals a specialized economy emerging around email account takeover and takes an in-depth look at the threats organizations face and the types of defense strategies you need to have in place. Report highlights More than one-third of the hijacked accounts analyzed by researchers had attackers dwelling in the account for more than one week.
Hackers could be lurking in your email account for more than a week after hijacking it to harvest information before selling it off to other criminals, a new report from Barracuda Networks has warned. A study carried out by Barracuda and UC Berkeley found that just over a third of hacked corporate email accounts sustained attacks for more than a week, during which time attackers would monitor how the organisation did business so that they could launch subsequent phishing attacks.
The latest form of business email phishing attacks involve impersonating familiar senders, a GreatHorn report found. GreatHorn also acknowledged this uptick the report noted that this view isn't fully adequate in understanding how phishing email attacks are evolving, and how security teams are responding to those threats.
Email phishing attacks work by spoofing or referencing well-known topics that the attackers hope will arouse fear or concern or interest on the part of the recipients. To compile its "Q2 2020 Top-Clicked Phishing Report," KnowBe4 examined tens of thousands of email subject lines from simulated phishing tests as well as "In-the-wild" email messages that employees received and reported to their IT departments as suspicious.
Microsoft's desktop email client Outlook has stopped working worldwide for countless users, whether they are using it with an on-premises Exchange server or with the Office 365 cloud. As a workaround, users can utilize Outlook on the web or their mobile clients.
A newly discovered, sophisticated threat group that targets organizations without DMARC implemented and relies on business email compromise is heralding what researchers call "a new age" of business email compromise. On July 15 at 2 p.m. ET, join Valimail Global Technical Director Steve Whittle and Threatpost for a FREE webinar, "DMARC: 7 Common Business Email Mistakes." This technical "Best practices" session will cover constructing, configuring, and managing email authentication protocols to ensure your organization is protected.