SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Social Engineering stories - Page 3

Story image
Venafi uncovers suspicious retail lookalike domains using valid certificates
Mon, 18th Nov 2019
#
venafi
#
dns attacks
#
cios
The total number of certificates using lookalike domains is more than 400% greater than the number of authentic retail domains.
Story image
Organisations' cybersecurity readiness for new regulations still low - ESET
Mon, 11th Nov 2019
#
ransomware
#
phishing
#
malware
Across all countries surveyed, prioritisation was identified as the biggest organisational cybersecurity challenge (20%).
Story image
Overcoming deepfakes with deep learning
Thu, 4th Jul 2019
#
deep instinct
#
social engineering
#
deepfakes
Deepfakes raise alarm as AI-crafted videos blur truth lines, challenging media integrity.
Story image
Cybersecurity: Starting with the human factor
Wed, 3rd Jul 2019
#
phishing
#
email security
#
awareness
In a recent report by Dell EMC, it was discovered that data-loss incidents cost Singapore organisations an average of US$1.4 million over 12 months.
Story image
Why it’s time for organisations to rethink their cybersecurity strategy
Wed, 8th May 2019
#
email security
#
phishing
#
cybersecurity
Proofpoint says commonly targeted accounts are not necessarily people who are known or actively tracked by the security team.
Story image
Cyber threats progressing as defenses evolve - Trustwave
Mon, 29th Apr 2019
#
cybersecurity
#
report
#
cios
2019 Trustwave report unveils evolving cyber threats and data breach trends.
Story image
Okta launches $50mil fund to fuel identity solutions startups
Thu, 4th Apr 2019
#
okta
#
venture fund
#
social engineering
The fund will seek out startups that are aligned with Okta's vision of enabling any organisation to use any technology.
Story image
Email fraud increased by 476% in last year - Proofpoint
Fri, 8th Feb 2019
#
email security
#
phishing
#
proofpoint
As these threats continue to grow in volume and sophistication, it is imperative that organisations implement a people-centric security approach.
Story image
Proofpoint: Social engineering and credential stuffing attacks up in 2018
Wed, 30th Jan 2019
#
cloud services
#
phishing
#
email security
Proofpoint's report reveals a surge in phishing attacks, with 83% of firms hit in 2018.
Story image
Dialling up deception: ‘Vishing’ scams prey on human trust
Fri, 11th Jan 2019
#
martech
#
phishing
#
seo
The Australian Taxation Office (ATO) recently warned of a sophisticated phone scam, manipulating Australians for a reported $830,000 in November.
Story image
2019 threat landscape predictions - Proofpoint
Tue, 18th Dec 2018
#
malware
#
email security
#
cybersecurity
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Story image
Businesses too slow on attack detection – CrowdStrike
Thu, 13th Dec 2018
#
malware
#
ai security
#
ai
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Story image
Back to the basics: Five ways to stay safe online
Tue, 16th Oct 2018
#
firewall
#
network management
#
network security
Phishing attacks or social-engineering attacks are on the rise, where cybercriminals trick people into divulging details and participating in scams.
Story image
New research reveals which employees are being targeted for why
Wed, 12th Sep 2018
#
email security
#
phishing
#
proofpoint
Individual contributors and lower level management account for nearly two thirds (60%) of highly targeted attacks within an organisation.
Story image
Collaboration tool APIs leaving organisations vulnerable
Mon, 9th Jul 2018
#
uc
#
firewall
#
breach prevention
Alongside the migration to the cloud has been the rise of application programming interfaces (APIs) and artificial intelligence (AI).
Story image
Internet security researcher seeking assistance from cybercrime victims
Wed, 27th Jun 2018
#
phishing
#
email security
#
cios
Auckland researcher seeks 1000 Kiwi internet users to assist in a project to understand human risk factors in cybersecurity. #CybersecurityNZ.
Story image
All in a day's work: Why hackers hack and how they do it
Thu, 12th Apr 2018
#
hackers
#
nuix
#
social engineering
It can take hackers less than an hour to steal data from an organisation, and most of the time their targets don’t even detect the attacks.
Story image
CERT Australia reveals this year's cybersecurity challenges
Tue, 27th Feb 2018
#
iot
#
phishing
#
email security
Criminals will exploit known vulnerabilities; social engineering will craft sophisticated networks; supply chain targeting will target third parties..
Story image
Barracuda acquires social engineering platform PhishLine
Thu, 11th Jan 2018
#
firewall
#
phishing
#
email security
PhishLine’s social engineering simulation and training platform expands Barracuda solutions to protect against email-borne targeted attacks.
Story image
CASE STUDY: How cybercriminals targeted QLD law firm with social engineering
Tue, 9th Jan 2018
#
cybersecurity
#
cybercrime
#
cios
Cybercriminals stole millions from Queensland law firms using a simple email scam, tricking lawyers into revealing their login passwords.
Story image
Staff web usage: To filter, or not to filter...
Mon, 30th Jun 2014
#
cloud services
#
payroll systems
#
phishing
Whether or not to filter and monitor employee web usage has long been a dilemma for many an SME.
Story image
Shock, horror: Mobility and social networking the new target for cyber miscreants
Wed, 12th Sep 2012
#
apple
#
cloud services
#
smartphones
In what should come as no surprise at all, it appears the new frontiers opening up for the malcontents of the connected world are smartphones and social networking sites.
Story image
Spam shrinks as scammers go social
Tue, 1st May 2012
#
cloud services
#
symantec
#
nz
Symantec's annual Threat Report shows 81% rise in blocked attacks.
Story image
Check Point Experience 2011: Security Evangelism
Thu, 8th Sep 2011
#
malware
#
cybersecurity
#
linkedin
A guide to hacking via social engineering, plus: how to take over a nuclear power plant.