MISTI’s InfoSec World, March 19-21 in Lake Buena Vista, FL, is nearing and Crane Hassold, PhishLabs' threat research manager, is set to present on the attack techniques that threat actors are employing to overcome detection and blocking techniques.
Spoofing a phone number is not a new concept, you probably get several calls from them a day, but with the accessibility of VoIP solutions and open source software spoofing a phone number is a breeze.
Telemarketers, robocalls, spammers, scammers, and even prank callers use it, and what once started as a simple grab and go of any available phone number has since evolved.
A newly observed variant of BankBot has been discovered masquerading as Adobe Flash Player, Avito, and an HD Video Player. This variant, now detected by PhishLabs as BankBot Anubis, was first identified on March 5, 2018.
Can a single word create broad-sweeping implications to how we use the internet? It most certainly can, and an upcoming software update to Google Chrome may drive a false sense of security while shaming other sites all due to a single word: Secure.
Today, PhishLabs is proud to announce the launch of our new annual scholarship program that is focused on furthering professionals interested in the growing world of cybersecurity. Dubbed the Future of Cybersecurity Scholarship Program, we will be able to help fuel student’s growth into one of the most in-demand industries.
Training and education models of the past are antiquated and ineffective, and when it comes to the risk of your company and clients that simply isn’t good enough.
Our webinar for March will focus on a new and improved education model that can be built out as part of an organization’s security awareness training.
Topics: security awareness training
In January we released an in-depth technical white paper that pulls apart the Qadars Banking Trojan, a threat that targets financial institutions, POS systems, and even popular online gaming sites.
There was a great deal of information, including just how much effort our R.A.I.D. team had to put into reverse-engineer the malware, which is why we wanted to further highlight exactly why this trojan is such a threat.
HIMSS 18 health IT conference is coming up March 5-9 in Las Vegas, and the PhishLabs team will be in attendance to chat about why the healthcare industry is such a unique target for cyber criminals and what organizations can do to defend against cyber threats.
You can also join Chris Bowen, our Senior Security Engineer, and Ryan Clemency, Account Executive, for a discussion around healthcare targeting and how organizations can leverage their security technologies and assets to manage risk.
Making the move from the typical security awareness training approach to a powerful anti-phishing program isn’t an easy sell.
Executive boards are used to basic training programs with boring annual sessions, and (let’s be honest) minimal results… with correspondingly tiny budget approvals. So when they finally do agree to a more in-depth program, there’s a tendency to expect results overnight.
The trouble is, training users to spot and report phishing emails isn’t an overnight fix. And trying to realize dramatic results in a short timescale is a surefire way to hamstring your program.