Skip to Content

Tag: phishing


Also Noted

BUFFERZONE launches anti-phishing solution

December 6, 2022SSN Staff

TEL AVIV, Israel – Endpoint security solutions provider BUFFERZONE has just released their AI-based anti-phishing solution that promises advanced protection against disruptive phishing campaigns. BUFFERZONE Anti-Phishing is a browser extension using AI algorithms to provide a lightweight, state-of-the-art analysis and detection suite. Anti-Phishing extends BUFFERZONE’s browsing protection past endpoint containment and content disarming to provide defense against users from phishing...

AI algorithms, anti-phishing, brand detection, BUFFERZONE, Endpoint Security, Israel Levy, phishing, Ran Dubin


Read Full Articlered right arrow icon

Netskope threat research identifies next gen phishing tactics

Cybersecurity

Netskope threat research identifies next gen phishing tactics

November 2, 2022SSN Staff

SANTA CLARA, Calif. – Netskope, the SASE computer security platform provider has released their new threat research which reveals the top sources of phishing attacks and cloud vulnerabilities. Threats this go around are led by fake login page referrals, fake third-party cloud apps and more as detailed in the Netskope Cloud and Threat Report: Phishing. These threats mimic legitimate apps in order gain access to unsuspecting users’ information. “Although email is still a primary...

Chrome extensions, cloud data, fear, uncertainty, and doubt (FUD), Google Drive, Netskope, phishing, Ray Canzanese, SASE, security platform, third party apps


Read Full Articlered right arrow icon

Central banks security an uncomfortable unknown as cyberattacks increase

Cybersecurity

Central banks security an uncomfortable unknown as cyberattacks increase

September 14, 2022Ken Showers, Managing Editor

YARMOUTH, Maine – As data breach becomes a daily occurrence across every connected industry, experts look nervously to central bank financial institutions for potential damage to international finance. On September 14 the Bank for International Settlements (BIS) produced a working paper titled “Cyber risk in central banking” that examines the readiness and stance of those institutions as cyber crime grows. “While there have been several studies and surveys on cyber threats...

Bank for International Settlements (BIS), Central banks, cyberattacks, data breach, phishing, supply chain attacks


Read Full Articlered right arrow icon

Samsung latest in long line of data breaches

Cybersecurity

Samsung latest in long line of data breaches

September 2, 2022Ken Showers, Managing Editor

YARMOUTH, Maine – There’s bad news for Samsung customers this week as the electronics giant divulged the occurrence of a July 22 data breach. In a corporate statement that Samsung released, the company discussed the recently discovered (August 4) data breach while assuring customers that some of its more vital data was still protected. “We want to assure our customers that the issue did not impact Social Security numbers or credit and debit card numbers, but in some cases, may...

0ktapus, 2FA, Cybersecurity, data breach, Group-IB, phishing, Samsung, Twilio


Read Full Articlered right arrow icon

Also Noted

ReasonLabs launches free online security tool

August 25, 2022SSN Staff

NEW YORK – Cybersecurity company ReasonLabs has launched a new product called Online Browser Security that the company says will provide 24/7 protection against cyber threats. Online Browser Security is said to protect against and help prevent intrusive cookies and trackers, malicious URLs, phishing attempts, notifications and pop-ups, harmful extensions and more. Online Browser Security is integrated with ReasonLabs’ antivirus software RAV Endpoint Protection to keep users’...

Cybersecurity, Endpoint Protection, Kobi Kalif, Machine Learning, phishing, ReasonLabs, User Data


Read Full Articlered right arrow icon

Monitoring Matters

Passwords … mind over matter

July 8, 2020Ginger Hill

I’m always fascinated when I see articles stating that the top passwords of the year were “password” “1234” or “qwerty” or even “abc” in conjunction with the millions of articles about data breaches that offer easy-to-do actions for people to take to protect their personal data, either personal or work. Why are the exact same, weak passwords being used over and over when people know and understand that data can and most likely will be hacked?...

biometrics, cyber security, Cybersecurity, facial biometrics, fingerprint biometric, phishing, secure passwords


Read Full Articlered right arrow icon

Monitoring Matters

Zoom “zooms” up its lax security

July 1, 2020Ginger Hill

COVID has taken the physical world virtual. As stay-at-home orders abounded, and quite frankly, should still be observed, along with wearing masks, social distancing and washing of hands, colleagues, family, friends, clubs and other groups hit the virtual world to do business, stay connected and attempt to have some sort of calmness amid pure chaos. At the same time, threat actors and cybercriminals were at the ready, armed with a playbook of schemes to run interference.  The platform of...

COVID, COVID-19, cyber security, Cybercrime, Cybersecurity, online events, phishing, Ransomware, Zoom


Read Full Articlered right arrow icon

Monitoring Matters

The art of privacy

June 10, 2020Ginger Hill

The struggle is real in this COVID-19 world we’re all living in with so many uncertainties, concerns, distracted thinking, working from home … the list goes on and on. A huge concern that employers and employees must realize is that to enable continued, gainful employment and the ability to work from home, technology/hardware has to be protected from threat actors and processes have to be in place to fend off cyberattacks.  First, thinking must shift to that of protection,...

Coronavirus, COVID-19. COVID, COVID19, Cybersecurity, mobile, mobile access, phishing, Smart Devices


Read Full Articlered right arrow icon

Cybersecurity

How companies can fight against cyber threats

December 16, 2019

YARMOUTH, Maine—As 2019 closes, 2020 is full of new possibilities and opportunities. While it's a time for growth, change and newness, cyber criminals are lurking in the background ready to strike. The threats that these criminals have planned for the new year have already been months in the making and are far from cookie cutter. Therefore, companies must be alert and ready.“Defending a company against them [cyber threats and crimes] requires a broad approach,” Christian Nascimento,...

Christian Nascimento, Comcast, cyber security, Cybersecurity, HID Global, Min Kyriannis, phishing, Security Industry Association, SIA, SIA Cybersecurity Advisory Board, Tiffany Pressler


Read Full Articlered right arrow icon

Monitoring Matters

9 tips to stay cyber safe while traveling

October 9, 2019Ginger Hill

As October presents itself in terms of pumpkin-spiced “everything,” cooler temps, colorful leaves, National Cyber Security Awareness Month (NCSAM) (ICYMI - we are 2019 Champions) and the announcement of SecurityNext's program, Fall is a whirlwind of excitement! This time of year also reminds me of the extensive travel that takes place to family and friends' homes for holiday gatherings, industry conferences and other work trips, vacations and the like. And, since the world is...

Bluetooth, cyber security, NCSAM, NICCS, passphrase, phishing, secure passwords, SecurityNext, U.S. Department of Homeland Security


Read Full Articlered right arrow icon