Security Practitioner’s Guide to Email Spoofing and Risk Reduction
In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...
Read Post
Weekly Intelligence Summary: Ep 4
This week, Alex Guirakhoo and Jamie Collier join Harrison to discuss APT39, a new Iran-linked espionage group, as well as other highlights from this week involving updated information about...
Read Post
Protecting Your Brand: Return on Investment
Last week I was joined by Brett Millar, Director of Global Brand Protection for Fitbit, for a webinar on “Protecting ...
Read Post
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It
We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.
Read Post
Episode 54: Marriott Breach And 2019 Trends
Rick Holland and Harrison Van Riper join Michael Marriott to discuss the implications of the Marriott data breach, as well as a look forward to trends we might see in 2019. Specifically, we dig...
Read Post
Law Firm Uncovers Exposed Sensitive Details About Top Attorney Online
VIPs and executives who are critical to your company and brand can be targeted by threat actors or groups who ...
Read Post
Episode 55: Tackling Phishing
Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups,...
Read Post
Phishing Site Impersonates Financial Services Institution
If the infamous bank robber, Willie Sutton, were alive today and honed his cyber skills, he might turn his attention ...
Read Post
Business Email Compromise: When You Don’t Need to Phish
According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since ...
Read Post