Regardless of the political fall-out from Special Counsel Robert J. Mueller’s indictment of twelve Russian intelligence operatives for tampering with the 2016 U.S. Presidential election, this much seems clear after reading the 29-page, John LeCarre-like document: It has become unreasonable to expect any organization to successfully defend against such a massive, coordinated cyberattack.
Read More
Tags:
Mueller,
U.S. election,
presidential election,
spear-phishing,
phishing,
cyberattacks,
Russian hackers,
Russian operatives,
Russian intelligence,
GRU,
Clinton Campaign,
DNC,
Democratic National Committee,
DCCC,
Democratic Congressional Campaign Committee,
isolation,
browser isolation,
remote browsing,
credential theft,
malware,
Podesta,
Clinton,
cryptojacking,
cryptocurrency,
X-Agent
On the Serengeti, wildebeest have survived for millennia by using a simple strategy: safety in numbers. It’s great for the species, but each animal can only hope that another one will take one for the team.
Read More
Tags:
isolation platform,
cyberattacks,
remote browsers,
browser-based attacks,
"risky web",
safe web,
trust
It seems that almost daily, there is a new story about another bank or financial services institution (FSI) falling victim to a phishing or other cyberattack.
Read More
Tags:
anti-phishing,
cyberattacks,
malicious code,
Trickbot banking Trojan,
malware,
CISO,
multi-factor authentication,
Trojans,
isolation,
remote browers
The financial services industry is consistently among the most highly targeted industries for cyberattacks. Financial services institutions (FSIs) are a popular and frequent focus of attackers because, to quote famed bank robber Willie Sutton, when asked why he robbed banks: “That’s where the money’s at.”
Read More
Tags:
financial services industry,
cyberattacks,
phishing,
phishing attacks,
phishing prevention,
malware,
ransomware,
isolation,
banking credentials,
keyloggers,
employee credential theft,
credential theft,
watering hole attacks,
drive-by exploits,
spear-phishing