<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Cyber Monday: Going Phishing?

Posted by Jay Kelley on Nov 21, 2017

 

The holiday shopping season kicks off this week with Black Friday (November 24 th) and Cyber Monday (November 27 th). And, if it’s any indication of how much online shopping will occur, last year (2016), Cyber Monday set a new sales record of $3.45 billion USD!
Read More

Tags: cyber attacks, phishing, cyber Monday, Black Friday, isolation, isolation platform, malware

For Feds, DMARC is a Start, But More is Needed

Posted by Jay Kelley on Nov 9, 2017

 

Last month, the U.S. Department of Homeland Security directed federal agencies to begin employing enhanced security methods and protocols on all government email accounts. This action is an effort to halt the impersonation of U.S. government email domains, referred to as spoofing, by attackers intent on deploying a dizzying array of cyber attacks typically initiated by a phishing campaign. Given that many reports place the start of a cyber attack squarely on phishing campaigns—some reports place the figure at over 90% of cyberattacks are as the result of phishing—it makes sense that the DHS would require greater email security for federal government email accounts and inboxes.

Read More

Tags: DMARC, cyber attacks, cyber security, phishing attack, isolation

The SWIFT Security Controls Framework and Isolation

Posted by Jay Kelley on Nov 7, 2017

If you are in the financial services community, you are likely well-aware of and well-acquainted with SWIFT and the services it performs. As a quick primer for the uninitiated, SWIFT is an acronym for the Society for Worldwide Interbank Financial Telecommunication, a cooperative built over forty years ago by banks and financial institutions globally to address a mutual problem: A better, more secure, and automated way to communicate inter-bank payments across borders. SWIFT addressed this common issue, and today, it is a world-leading provider of secure messaging services for over 11,000 banks, financial organizations, and enterprises in over 200 countries.

Read More

Tags: SWIFT, cyber attacks, phishing, spear-phishing, malware, isolation technology, isolation platform

Oh, JavaScript – You Devil!

Posted by Jason Steer on Oct 31, 2017

I think we’ve blogged a few times now on the risks of JavaScript and the role it plays in browser-based cyber attacks. We’ve recently seen the details of the Pornhub attack, where malicious adverts were used to target users visiting the Pornhub website and served up fake browser updates as another in a very long list of malvertising attacks.

Read More

Tags: javascript, cyber threats, coinhive, cyber attacks, isolation technology

You Are a Bad Rabbit!

Posted by Jason Steer on Oct 26, 2017

It’s another day and another cyber attack headline in the media. This time it’s another ransomware-style attack; this one is called “Bad Rabbit”. According to media reports, it has impacted organizations in Russia and Ukraine mostly, with reports of some businesses in Turkey and Germany (and possibly in Poland and Japan) also being affected (that we know of so far).

Read More

Tags: ransomware, bad rabbit, credential theft, javascript, isolation technology, web isolation, cyber threats

Mission Impossible 17 – Spear Phishing

Posted by Jason Steer on Oct 24, 2017

Spear phishing attacks continue to plague businesses of all sizes, across all sectors. Detection of these messages remains an impossible feat. Spear phishing messages plague everyone and their intent ranges from delivering malware or ransomware, to stealing passwords and personal information, such as bank account information. All of these things have a high value in the online criminal world, hence why spear phishing is the most popular tool in the cyber attack arsenal today.

Read More

Tags: spear-phishing, anti-phishing, cyber attacks, cyber security, ransomware, cyber training

Isolate ALL: Unlocking Isolation's Full Potential

Posted by Greg Maudsley on Oct 19, 2017

Threat isolation is fast becoming the new “must-have” technology for IT security teams. It has gained recognition from leading analysts, and enterprise adoption is taking off. Case-in-point, Menlo Security now has hundreds-of-thousands of users across the globe using isolation to access the web without worry of malware infections. What is of particular importance is that 90% of these Menlo Security customers are isolating ALL of their web traffic, which unlocks isolation’s full potential. So why is this significant? 

Read More

Tags: cyber security, isolation technology, web isolation, cyber threats

Stopping Phishing Is One Thing; Stopping What It Delivers Is Another

Posted by Jay Kelley on Oct 16, 2017

At the recent FS-ISAC Fall Summit in Baltimore, Maryland, many attendees—whether banks, insurance companies, or other financial services institutions (FSIs), such as brokerages—expressed their concerns about phishing attacks.

Read More

Tags: FS-ISAC Annual Summit 2017, malware, phishing attack, cyber security

Financial Phishing for Funds and (Customer) Facts

Posted by Jay Kelley on Sep 26, 2017

It seems that almost daily, there is a new story about another bank or financial services institution (FSI) falling victim to a phishing or other cyberattack. 

Read More

Tags: anti-phishing, cyberattacks, malicious code, Trickbot banking Trojan, malware, CISO, multi-factor authentication, Trojans, isolation, remote browers

Why Financial Institutions Are Phishing’s “Big Catch”

Posted by Jay Kelley on Aug 29, 2017

The financial services industry is consistently among the most highly targeted industries for cyberattacks. Financial services institutions (FSIs) are a popular and frequent focus of attackers because, to quote famed bank robber Willie Sutton, when asked why he robbed banks: “That’s where the money’s at.”  

Read More

Tags: financial services industry, cyberattacks, phishing, phishing attacks, phishing prevention, malware, ransomware, isolation, banking credentials, keyloggers, employee credential theft, credential theft, watering hole attacks, drive-by exploits, spear-phishing

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.