Security News

Business Email Compromise (BEC) Criminal Ring
2020-07-10 11:12

Dubbed Cosmic Lynx, the group has carried out more than 200 BEC campaigns since July 2019, according to researchers from the email security firm Agari, particularly targeting senior executives at large organizations and corporations in 46 countries. Rather than use free accounts, Cosmic Lynx will register strategic domain names for each BEC campaign to create more convincing email accounts.

Email Sender Identity is Key to Solving the Phishing Crisis
2020-07-06 14:07

The proof is in the results: Phishing attacks of just one type - the business email compromise - have caused at least $26 billion in losses in the past five years alone, according to the FBI. The Heart of the Problem. Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

Users who don't understand how to encrypt their emails won't do it
2020-07-02 18:00

Users who don't understand how to encrypt their emails won't do it. There's another danger for companies whose users do try to grapple with the internal email encryption system: rising support costs.

Email Sender Identity is Key to Solving the Phishing Crisis
2020-07-01 13:00

The proof is in the results: Phishing attacks of just one type - the business email compromise - have caused at least $26 billion in losses in the past five years alone, according to the FBI. The Heart of the Problem. Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

Tune in and watch live right here this week – it's your email encryption wake-up call
2020-07-01 06:00

Most businesses tell us that they think email encryption is a priority that's part of their digital transformation and cloud migration. Deploying encryption isn't just about flicking an on switch for some technology and you're done.

Fake “DNS Update” emails targeting site owners and admins
2020-06-30 12:43

The link took them to a "Surprisingly believable" phishing page with logos and icons that matched their service provider, and instructed them to enter their WordPress account username and password to start the update. "The scam then shows you some fake but believable progress messages to make you think that a genuine 'site upgrade' has kicked off, including pretending to perform some sort of digital 'file signing' at the end," Sophos's security proselytiser Paul Ducklin explained.

Does analyzing employee emails run afoul of the GDPR?
2020-06-29 05:00

A desire to remain compliant with the European Union's General Data Protection Regulation and other privacy laws has made HR leaders wary of any new technology that digs too deeply into employee emails. At the same time, new technologies are applying artificial intelligence and machine learning to solve HR problems like analyzing employee data to help with hiring, completing performance reviews or tracking employee engagement.

Tune in and watch live: Email encryption doesn’t have to be an all-or-nothing deal
2020-06-26 18:00

With email now the number one destination to hoodwink overworked and bleary-eyed users with a confidence trick, there are many, many reasons to keep email secure. The historical problem with a technique like encryption in the past has been, if carried out in a heavy-handed fashion, it can be an all-or-nothing kind of deal.

ZL Technologies enhances its platform to strengthen email review process for compliance departments
2020-06-25 00:30

ZL Technologies announced enhancements to the ZL UA Compliance platform that significantly strengthen the email review process for compliance departments. A flexible review pipeline for compliance departments, ensuring flagged communications are defensibly managed.

Guide: How to assess your email vulnerability for free in 20 minutes
2020-06-23 02:55

Attacks delivered via email are extremely common and the fact is that many popular security solutions are just not handling these attacks well enough, missing 20-40% of the new attacks emerging every day. Assessing your email vulnerability is a critical step in evaluating your overall security posture.