PhishMe Blog

STAY CURRENT ON INDUSTRY TRENDS & PHISHME NEWS

Current events: How news exposes your company to spear phishing attacks

BY Scott Greaux IN Phishing

Like many high-profile events, the passing of Apple’s co-founder and former CEO, Steve Jobs, has initiated a slew of new phishing attacks that are designed to play on recipients’ emotions about the event.  Steve Jobs and Apple themed phishing campaigns are in the wild but more concerning are the spear phishing attacks targeting iPhone users.  PhishMe understands how these events can adversely affect our customers therefore we have released a new phishing simulation theme designed to train susceptible users on how to identify and avoid current event based attacks. -Scott

READ MORE

0 comments

User Awareness: A Growing Concern Among Organizations

BY PhishMe IN Internet Security Awareness

Phishing has always been a challenge for companies, but in recent months high profile breaches have cast a bright light on a more pressing aspect of the phishing threat – user awareness; or the lack there of! The reason phishing attacks are so effective is because most employees have a basic level of phishing awareness. Companies attending recent events such as Black Hat and SANSFIRE, reiterate a common theme; “we need more effective ways to increase our employees’ awareness to help minimize the success of phishing attacks.” Once thought of as a threat that could be mitigated simply by an…

READ MORE

0 comments

Spear Phishing Impersonators: Beware of familiar names from free email services

BY PhishMe IN Phishing

There is a common spear phishing tactic that we help our PhishMe customers combat, and that is attackers using familiar names with fake free webmail accounts. The attacker wants to break into Widget, Inc.  The first thing they do is research Widget, Inc., looking business units who may have access to the information assets they are targeting.  Once they have picked their target, they need familiar names to make their spear phish more enticing to the eventual victim. They will pick a real name inside of Widget, Inc, that will serve as the From: line of the spear phishing email. Sometimes…

READ MORE

0 comments

Machines v/s Humans: Who Do You Think Is More Intelligent?

BY PhishMe IN Cyber Incident Response, Threat Intelligence

As the barrage of security breaches continues, Citigroup is the latest victim. This eWeek article: http://www.eweek.com/c/a/Security/Citigroup-Credit-Card-Portal-Breach-Compromises-200000-Customers-461930/ discusses the potential impact of this attack.   One of the commentators brings up the topic of phishing.   Hannigan, the CEO of Q1 labs, rightly points out that  “Security trust means more than just making sure you’re in compliance with regulations,”. On the other hand, some of the quotes, like that from Anup Ghosh, co-founder of Invincea has a blatant technology solution vendor bias. He discounts human intelligence when referring to customers in this quote – “it’s not reasonable to expect them to differentiate…

READ MORE

0 comments

Phishing and Spear-Phishing and APTs, oh my!

BY PhishMe IN Phishing

With all of the media coverage on the recent flurry of successful phishing attacks targeting RSA, Epsilon’s clients and their customers, and Oak Ridge, it’s come to our attention that the fire hose of terms might leave some people confused.  We thought it might be a good opportunity to explain what some of these terms are (and aren’t). Phishing Phishing essentially boils down to an adversary tricking a victim into doing something. Email is, by far, the most common medium used but others are certainly possible (snail mail, telephone calls, etc.). A traditional consumer email phish is what most of…

READ MORE

0 comments

RSA breach: Lessons Learnt

BY PhishMe IN Internet Security Awareness, Phishing

Most of you have probably heard about the “RSA hack” by now. It was hot news three weeks ago when an employee at RSA fell prey to a targeted phishing attack as explained in this blog post: http://blogs.rsa.com/rivner/anatomy-of-an-attack/ . A couple of issues highlighted in this article really caught my attention. The article states – “These companies deploy any imaginable combination of state-of-the-art perimeter and end-point security controls, and use all imaginable combinations of security operations and security controls. Yet still the determined attackers find their way in. What does that tell you?“.  That tells me that technology by-itself is…

READ MORE

0 comments