Security News
From October 2019 through December 2019, the email security company analyzed 202 billion emails and rejected 92 billion as malicious. The Mimecast Threat Intelligence Report RSA Conference Edition 2020 reports that the emerging Malware-as-a-Service model means that simpler attack methods can reach more targets while keeping older, well-known malware active at the same time.
Nearly one million domains use DMARC, but only 13% of them are configured to actually prevent email spoofing, according to a report published this week by anti-phishing solutions provider Valimail. DMARC is an email authentication, policy, and reporting protocol designed to detect and prevent email spoofing.
T-Mobile US was hacked by miscreants who may have stolen some customer information. The hackers gained access to employee email accounts, which contained customer account information.
Software security company identified 92 billion malicious mails in Q4 and a spike in Emotet and ransomware.
US-based telecom giant T-Mobile has suffered yet another data breach incident that recently exposed personal and accounts information of both its employees and customers to unknown hackers. What happened? In a breach notification posted on its website, T-Mobile today said its cybersecurity team recently discovered a sophisticated cyberattack against the email accounts of some of its employees that resulted in unauthorized access to the sensitive information contained in it, including details for its customers and other employees.
As of January 2020, nearly 1 million domains have published DMARC records - an increase of 70% compared to last year, and more than 180% growth in the last two years. Just 13% of all DMARC records are configured with enforcement policies, demonstrating that interest in DMARC is increasing but DMARC expertise is not keeping pace.
In its 2020 Global Threat Report, CrowdStrike found that bad actors are disabling endpoint protection and compromising WordPress sites to steal data and credentials. CrowdStrike's eport includes a threat landscape overview, ransomware threat assessment, e-crime trends and activity, and an update on intrusions from Iran, North Korea, China, Russia and other countries.
At the RSA security conference in San Francisco on Tuesday, Google's security and anti-abuse research lead Elie Bursztein will present findings on how the new deep-learning scanner for documents is faring against the 300 billion attachments it has to process each week. It's challenging to tell the difference between legitimate documents in all their infinite variations and those that have specifically been manipulated to conceal something dangerous.
The new feature, DKIM key management, is currently in beta and users have been encouraged to share feedback to help ProtonMail developers improve it. The signature is linked to the user's domain name and it's created with a private key that has a corresponding public key added to the domain registrar's DNS. If DKIM is used, the email recipient's server looks up the public key and uses it to verify the signature in the message's header to ensure that the email is legitimate.
British utility biz Southern Water was the victim of a phishing attack on Wednesday, resulting in a hurried shutdown of some of the company's systems. An industry insider told The Register that Southern Water's networks, including the system responsible for Supervision, Control, and Data Acquisition were hit.