Year In Review: Ransomware
Topics: Ransomware
The Anatomy of a Look-alike Domain Attack
Cybercriminals register hundreds of thousands of look-alike domains every year to impersonate reputable brands and make a profit. These domains are used for a variety of attacks including phishing emails, fraudulent websites, web traffic diversion, and malware delivery.
Topics: Spear Phishing Protection, business email compromise, Digital Risk Protection, Domains
The Year In Review: How COVID-19 Has Changed Cyber Security
Topics: COVID-19
APWG Q3 Report: Four Out of Five Criminals Prefer HTTPS
Topics: Phishing, BEC, business email compromise, https, Domains
Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks
Topics: Digital Risk Protection, DRP, Domains, Brand Abuse
What is a Look-alike Domain?
By definition, a look-alike domain is a nearly identical, slightly altered domain name, registered with intent to deceive. Cybercriminals register hundreds of thousands of look-alike domains each year with the goal of impersonating legitimate brands and making money, usually by committing fraud.
In this post, we’ll describe how domains help us communicate on the Internet, the anatomy of a look-alike domain and why we fall for them, how attackers create them, and the best place to begin when facing this common threat.
Topics: Digital Risk Protection, Domains
Phishing Campaign Uses Malicious Office 365 App
Most phishing campaigns use social engineering and brand impersonation to attempt to take over accounts and trick the victim into divulging their credentials. PhishLabs has uncovered a previously unseen tactic by attackers that uses a malicious Microsoft Office 365 App to gain access to a victim’s account without requiring them to give up their credentials to the attackers.
Topics: Email Incident Response, Office 365
Top 7 Use Cases for Digital Risk Protection
Today’s enterprises are experiencing an accelerated digital transformation due to the pandemic, and adoption of initiatives that would normally span years are being fast-tracked to support remote workforces and transition to new platforms. The external digital landscape is also rapidly expanding, and organizations are being required to conduct business more frequently through non-traditional channels. This digital evolution is leaving enterprises increasingly susceptible to attacks outside the network perimeter.
In order to detect and respond to today's most relevant threats, security teams are investing in operational Digital Risk Protection (DRP) capabilities.Topics: Digital Risk Protection, DRP
Ransomware Groups Break Promises, Leak Data Anyway
Topics: Ransomware, Digital Risk Protection, Email Intelligence & Response, DRP