phishing attacks

Email Security Risk Report 2023

Email security risks in Microsoft 365 Organizations remain vulnerable to advanced phishing attacks, human error, and data exfiltration. 93% of the cybersecurity leaders who were surveyed for this report stated their organization had suffered an email security incident in the last 12 months. 99% of Cybersecurity leaders, meanwhile, admitted to being stressed about email security. […]

Email Security Risk Report 2023 Read More »

Enemy at the Gates

Financial services is among the industries that have been the heaviest hit by cybercrime — from the heyday of the Zeus and other banking trojans to Distributed Denial-of-Service (DDoS) attacks, modern phishing attacks, and ransomware. FinServ is a vital sector that plays a major role not only in the lives of people, but also in

Enemy at the Gates Read More »

Threat Report T2 2022

Welcome to the T2 2022 issue of the ESET Threat Report! The past four months were the time of summer vacations for many of us in the northern hemisphere. It appears that some malware operators also took this time as an opportunity to possibly rest, refocus, and reanalyze their current procedures and activities. According to

Threat Report T2 2022 Read More »

Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion

In Q1 2022, Kroll observed a 54% increase in phishing attacks being used for initial access in comparison with Q4 2021. Email compromise and ransomware were the two most common threat incident types, highlighting the integral part played by end users in the intrusion lifecycle. Kroll continues to observe widely-publicized vulnerabilities such as ProxyShell and

Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion Read More »

Cloud and Threat Report: Global Cloud and Malware Trends

EXECUTIVE SUMMARY In this edition of the Cloud Threat Report, we examine the past twelve months of malware downloads from the cloud and web. Trojans accounted for the overwhelming majority of malware downloads, with attackers using a variety of different Trojan families and social engineering techniques to target their victims. The majority of malware downloads

Cloud and Threat Report: Global Cloud and Malware Trends Read More »

The Cybersecurity Pandora’s Box of Remote Work

The transition to remote work opened a cybersecurity Pandora’s box. While the human workforce always comes with a particular security risk level – due mostly to hackers leveraging targeted phishing tactics via email, text, and phone ad nauseam – COVID-19 shutdowns created a need for rapid enterprise technology implementation despite the risks involved. Consequently, the

The Cybersecurity Pandora’s Box of Remote Work Read More »