<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/tag/bec/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog #BEC</title><description>ActiSoft Technology - Blog #BEC</description><link>https://www.actisofttechnology.com/blogs/tag/bec</link><lastBuildDate>Thu, 23 Apr 2026 21:15:57 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[BEC Attacks Are Targeting Lower-Level Employees]]></title><link>https://www.actisofttechnology.com/blogs/post/bec-attacks-are-targeting-lower-level-employees</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-668224090s.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman A new report from Barracuda found that most business email compromise (BEC) attacks are now targeting ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-1079995870.jpg" size="medium" data-lightbox="false" style="width:791px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>A new report from Barracuda found that most business email compromise (BEC) attacks are now targeting employees who aren’t in executive or financial roles.</div><br><div>“Many organisations focus their training and protection on who they perceive to be the most targeted individuals within the organisation—usually executive and finance teams,” Barracuda’s researchers write. “However, 77% of BEC attacks targeted employees in other departments. Attackers look for an entry point and a weak link within your organisation, and then they work their way to more valuable accounts. This highlights the need to secure and educate every employee to the same level.”</div></span></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="medium" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div><span style="font-weight:700;">Barracuda also found that one in five BEC attacks target employees in sales roles.</span></div><br><div></div><div>“Due to the nature of their role, sales reps are used to getting external messages from senders they haven’t communicated with before,” the researchers write. “At the same time, they are all connected with payments and with other departments including finance. For hackers, these individuals could be a perfect entry point to get into an organisation and launch other attacks.” They also have access to a lot of contacts</div><div><br></div><div><span style="font-weight:700;">IT departments were another prime target, with each IT employee being targeted by an average of forty attacks.</span></div><span style="font-weight:700;"><div></div></span><br><div>“When we look at the number of phishing emails targeting IT teams, although they received only 5% of the total number of attacks, each employee was targeted by 40 email attacks, which is well above average,” the researchers write. “IT staff has access to business-critical applications, so compromising their accounts can be extremely valuable to hackers as it will give them access to organisations’ security and IT infrastructure. Cybercriminals tailor their attacks to their victims, so there were barely any BEC attacks, which usually look for quick monetary return, targeting IT teams. However, when it comes to attacks that include phishing URLs designed to compromise accounts, IT was one of the top targets.”</div><br><div></div><div><div>New-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> can enable employees throughout your organisation to recognise and thwart <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.</div></div><br><div></div><div><div>Barracuda has the full <a href="https://assets.barracuda.com/assets/docs/dms/spear-phishing_report_vol6.pdf" title="story" target="_blank" rel="">story</a>.&nbsp;</div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Request A Demo:&nbsp;<span style="font-weight:700;">Security Awareness Training</span></h2></div>
<div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/SAT.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilise users as your last line of defence. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!</span><br></p></div>
</div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Save My Spot!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 18 Aug 2021 07:40:00 +0000</pubDate></item><item><title><![CDATA[Phishing Remains the Most Common Form of Attack]]></title><link>https://www.actisofttechnology.com/blogs/post/phishing-remains-the-most-common-form-of-attack</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Medium/iStock-836453798.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Phishing attacks are “by far” the most common vector for data breaches, according to a new survey by ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/iStock-679718274.jpg" size="medium" data-lightbox="true" style="width:573px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div><a href="/what-is-phishing" title="Phishing" target="_blank" rel="">Phishing</a> attacks are “by far” the most common vector for data breaches, according to a new survey by the UK’s Department for Digital, Culture, Media, and Sport (DCMS).</div></div><p><br></p><div>“Among those that have identified breaches or attacks, around a quarter (27% of these businesses and 23% of these charities) experience them at least once a week,” the report states. “The most common by far are phishing attacks (for 83% and 79% respectively), followed by impersonation (for 27% and 23%). Broadly, these patterns around frequency and threat vectors are in line with the 2020 and 2019 results.”</div><div><br></div><div><span style="color:inherit;"><div>The DCMS says most of the respondents observed a noticeable increase in phishing attacks since the beginning of the pandemic.</div><div><br></div><div>“Among the organisations saying cyber security had become a higher priority under the pandemic, there were those that said that, in their case, the frequency of attacks had increased since March 2020 – especially phishing attacks,” the report says. “Others giving this response felt their organisations were more exposed to cyber risks now that their staff were working from home, because there were more endpoints to deal with and because they had less oversight of staff outside the office. In some cases where organisations had moved online to a greater extent following the lockdown, management boards had started paying more attention to cyber security as a business risk.”</div></span></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div>The report found that only 20% of businesses said they conducted simulated phishing exercises for their employees, although respondents had a favourable view of risk assessments.</div><br><div></div><div>“In addition to their core purpose of identifying key risks, risk assessments were often viewed as a good way to produce evidence for management boards, which could be used to justify proposed cyber security actions or investment, or to show trends over time and whether things had improved,” the report says. “For example, one medium business carried out a mock phishing exercise as part of their risk assessment – they found that 15 per cent of staff responded to the mock phishing email, and presented these findings to the management board. This led to new user training on phishing emails, as well as other technical rule changes.”</div><div></div><br><div><div>New-school <a href="/security-awareness-training" title="security awareness training " target="_blank" rel="">security awareness training </a>with simulated phishing tests can help your employees thwart social engineering attacks.</div></div><div></div><br><div><div>The DCMS has the <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021/cyber-security-breaches-survey-2021" title="story." target="_blank" rel="">story.</a></div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free&nbsp;<span style="font-weight:700;">Phishing Security Test</span></h2></div>
<div data-element-id="elm_KX3wsrBMkP502XIfnyFH9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KX3wsrBMkP502XIfnyFH9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</div></div>
</div><div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-weight:700;">Here's how it works:</span><br></p><div><ul><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></ul></div>
</div></div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Mar 2021 13:33:05 +0000</pubDate></item><item><title><![CDATA[The Most Commonly Spoofed Business-Related Applications in a Phishing Campaign]]></title><link>https://www.actisofttechnology.com/blogs/post/the-most-commonly-spoofed-business-related-applications-in-a-phishing-campaign</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Medium/iStock-627319476.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Business-related applications like Zoom, Microsoft, and DocuSign are the most commonly spoofed servic ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_K181GJulRSeMPB2AjTWqEQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_K181GJulRSeMPB2AjTWqEQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dH7_4A98TlGro0W6gYV1_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sWFAZGeUSj-cOjCo3l4yQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6SOucho61sNVozqQ9bxmug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6SOucho61sNVozqQ9bxmug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><div><span style="font-size:14px;">Written by Stu Sjouwerman</span></div></div>
</div><div data-element-id="elm_d_G0oN8UqZlyifTibcx0gw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d_G0oN8UqZlyifTibcx0gw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/Picture1.jpg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Business-related applications like Zoom, Microsoft, and DocuSign are the most commonly spoofed services in phishing attacks, according to a new report from GreatHorn. Business apps made up 45% of all impersonation&nbsp;<a href="/what-is-phishing" title="phishing" target="_blank" rel="">phishing</a>&nbsp;attacks. Social media-related phishing attacks accounted for 34% of attacks, while consumer services like Amazon and PayPal made up 20%.</span></p><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><p style="margin-bottom:20px;">The researchers also found that while the total volume of daily phishing attempts has decreased compared to last year, the number of successful phishing attacks has increased. The researchers attribute this to attackers getting better at the social engineering aspect, as well as getting their emails past security filters.</p><div><span style="color:inherit;">“Though daily occurrences of phishing attacks have decreased from 36% to 25% between 2020 and 2021, weekly and monthly phishing attacks have increased from 28% to 42% and 11% to 17%, respectively,” GreatHorn says. “These attacks are increasingly difficult to detect as cybercriminals become more sophisticated and targeted in their attacks – advancing beyond the ‘batch and blast’ methodology to social engineering phishing campaigns. As a result of this, the quantity of phishing attempts being experienced by organisations may have decreased daily, but the impact of those campaigns that bypass traditional email security is increasing. As a result of increasing attacks, email security has risen to one of the top 3 IT security projects for 2021 among the organisations surveyed.</span></div></span></div></div>
</div></div><div data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_W5u15X0ZUSqQyfdx4NKi4Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><span style="color:inherit;"><div> The researchers note that a primary concern of most respondents regarding email security products was that the product would miss phishing attacks. </div><br><div></div>
<div> “Missing phishing attacks remains the top issue in current email security solutions with 39% of respondents noting this as a top concern in both 2020 and 2021,” the researchers write. They add, “Fewer organisations report being ‘satisfied’ with their current email security solution, decreasing from 76% in 2020 to 53% in 2021. On the other hand, organisations reporting their email security solution was ‘good enough’ increased from 19% in 2020 to 36% in 2021.” </div>
<div></div><br><div><div><a href="/security-awareness-training" title="New-school security awareness training" target="_blank" rel="">New-school security awareness training</a> can provide your organisation with an essential layer of defence by teaching your employees how to recognise phishing attacks. </div>
</div><div></div><br><div><div>GreatHorn has the full <a href="https://www.greathorn.com/company/press-releases/business-related-applications-are-the-most-frequently-impersonated-over-email-by-cybercriminals-spoofed-more-regularly-than-consumer-and-social-applications/" title="story.&nbsp;" target="_blank" rel="">story.&nbsp;</a></div></div></span></div>
</div></div><div data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vd_QDyLo9HvDhJ7o2WxobQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free&nbsp;<span style="font-weight:700;">Phishing Security Test</span></h2></div>
<div data-element-id="elm_KX3wsrBMkP502XIfnyFH9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KX3wsrBMkP502XIfnyFH9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</div></div>
</div><div data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_mdfoo19qzmlQXJLtBHEKZg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-weight:700;">Here's how it works:</span><br></p><div><ul><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></ul></div>
</div></div></div><div data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_m5bg7tahQfKJKJ_xSqhWIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 18:20:43 +0000</pubDate></item><item><title><![CDATA[A Hacker Is Selling Access To The Email Accounts Of Hundreds Of C-Level Executives]]></title><link>https://www.actisofttechnology.com/blogs/post/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-954712690.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman ZDNet's Zero Day column just reported one of the best reasons why you sh ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3Cy6pD-xR72mR5jNB9mQ1A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_d7IjBOiYTZySFuzvFAZdvg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IBI7XLf7TSSy97jVR5Mhqw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bDNBZXuAY3pQbwsCl5E_FA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bDNBZXuAY3pQbwsCl5E_FA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div>
</div><div data-element-id="elm_pTQtRM8bRJGC4_8FKZAqJw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pTQtRM8bRJGC4_8FKZAqJw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Great for Marketing Purposes and for Phishing!</h2></div>
<div data-element-id="elm_qVyB3KifLDH3rt_akc6I4g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width: 500px ; height: 331.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width:500px ; height:331.25px ; } } @media (max-width: 767px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width:500px ; height:331.25px ; } } [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/57e5d4454950a514f6da8c7dda79367f103cd9ed55536c48732f7ddc954cc559bd_1280.jpg" width="500" height="331.25" loading="lazy" size="medium" data-lightbox="true" style="width:1280px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>ZDNet's Zero Day column just reported one of the best reasons why you should step your users through <a href="/security-awareness-training" title="new-school security awareness training" target="_blank" rel="">new-school security awareness training</a> yet:</div>
</div><p><br></p><div>&quot;A threat actor is currently selling passwords for the email accounts of hundreds of C-level executives at companies across the world. The data is being sold on a closed-access underground forum for Russian-speaking hackers named Exploit.in, ZDNet has learned this week.&nbsp; The threat actor is selling email and password combinations for Office 365 and Microsoft accounts, which he claims are owned by high-level executives occupying functions such as:</div>
</div></div></div><div data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" title="Book a Demo!" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><ul><ul><li>CEO - chief executive officer</li><li>COO - chief operating officer</li><li>CFO - chief financial officer or chief financial controller</li><li>CMO - chief marketing officer</li><li>CTOs - chief technology officer</li><li>President</li><li>Vice president</li><li>Executive Assistant</li><li>Finance Manager</li><li>Accountant</li><li>Director</li><li>Finance Director</li><li>Financial Controller</li><li>Accounts Payable</li></ul></ul></div>
</div></div><div data-element-id="elm_LR6-vUFBWth14o56nO-CCA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LR6-vUFBWth14o56nO-CCA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Access to any of these accounts is sold for prices ranging from $100 to $1,500, depending on the company size and user's role. A source in the cyber-security community who agreed to contact the seller to obtain samples has confirmed the validity of the data and obtained valid credentials for two accounts, the CEO of a US medium-sized software company and the CFO of an EU-based retail store chain.</div><br><div>The source, which requested that ZDNet not use its name, is in the process of notifying the two companies, but also two other companies for which the seller published account passwords as public proof that they had valid data to sell. These were login details for an executive at a UK business management consulting agency and for the president of a US apparel and accessories maker.</div><br><div><div>I don't have to tell you the risks that this brings related to <a href="/what-is-ceo-fraud" title="CEO Fraud" target="_blank" rel="">CEO Fraud</a>, also known as Business Email Compromise. ZDNet has the <a href="https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/" title="full story." target="_blank" rel="">full story.</a></div></div></span></div></div>
</div><div data-element-id="elm_4O5nf_I8W5ITNweKrSGxoQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4O5nf_I8W5ITNweKrSGxoQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Get Your <span style="font-weight:700;">CEO Fraud Prevention Manual</span></h2></div>
<div data-element-id="elm_DG2siLEIQ9a8lcfVE7HcyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DG2siLEIQ9a8lcfVE7HcyQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div><div data-element-id="elm_q61azXnJQ-yb3kDjVydMjQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_q61azXnJQ-yb3kDjVydMjQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg?referrername=kb4ceofraud_whitepaper" target="_blank" title="CEO Fraud Manual"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div><div data-element-id="elm_5dkEERrHJoSP04toUSVAzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5dkEERrHJoSP04toUSVAzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Want to know and monitor the Dark Web for your organisations credentials? Check out our <a href="/domainwatch" title="DomainWatch" target="_blank" rel="">DomainWatch</a> service</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Dec 2020 11:15:21 +0000</pubDate></item><item><title><![CDATA[The Geography of Business Emails Compromise]]></title><link>https://www.actisofttechnology.com/blogs/post/the-geography-of-business-emails-compromise</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/55e3dc434f53a414f6da8c7dda79367f103cd9ed55536c48732f7fd0964dc45db0_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Researchers at Agari have released a report on the global distribution of business email compromise ( ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_V_QaXgNTS3uGMKHKo2OVDw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_A4P9MBOIRrGrDzLT-tWmHA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nM4d_UTQTy-1Q8Zqn9d2WQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Fy8OTJFRFwGgDAIMZwl3pA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Fy8OTJFRFwGgDAIMZwl3pA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Blog courtesy of KnowBe4</span></p><p><span style="color:inherit;"></span></p><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_eNQaOCRKnZhKxaOxMAEeFw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_eNQaOCRKnZhKxaOxMAEeFw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-622776790.jpg" size="small" data-lightbox="true" style="width:702px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Researchers at Agari have released a report on the global distribution of business email compromise (BEC) actors, and determined that 25% of these criminals are operating from within the United States. This makes the US the second-largest hub for BEC actors in the world. Criminals in Nigeria still account for the vast majority of BEC attacks, at 50% of the global total. South Africa was third, with criminals there responsible for 9% of these attacks. Agari’s researchers based their findings on incidents in which the attackers failed to anonymise their real-world locations.</span><br></p></div>
</div></div><div data-element-id="elm_qOMWkDE4Q96R7fRG16Tusg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qOMWkDE4Q96R7fRG16Tusg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;">“A quarter of the BEC actors we identified globally were located in the US, operating in 45 states and the District of Columbia,” Agari says. “Nearly half these scammers were located in five states: California, Georgia, Florida, Texas, and New York Many of the BEC actors in our dataset were clustered around a handful of US cities. The largest of these were based in and around Atlanta, GA, with 7% of all US-based BEC actors operating in this metropolitan area.”</div><p style="text-align:left;"><br></p><div style="text-align:left;">The US government isn’t letting these actors operate unperturbed—the Justice Department has arrested dozens of people allegedly involved in these schemes. Still, the number of BEC attacks originating in the US is notable, considering that Europe only accounts for 6%, the Middle East for 4%, and the Asia-Pacific for 2%.</div><p style="text-align:left;"><br></p><div style="text-align:left;">“It’s well-known that organizations within the United States are preferred targets for BEC actors. Some groups our team has researched, such as Exaggerated Lion, have exclusively targeted US-based businesses, for instance. But it may be surprising to some that a quarter of all BEC actors operate from within the US.”</div><p style="text-align:left;"><br></p><div style="text-align:left;">Agari adds that BEC activity is on the rise in other countries as well.</div><p style="text-align:left;"><br></p><div style="text-align:left;">“Because of the impact of BEC attacks globally, law enforcement in Nigeria has become more aggressive in recent years, which has caused BEC actors to migrate to other countries,” the researchers write. “Additionally, the significant return on investment from BEC scams has led far more sophisticated Eastern European cybercrime groups, like Cosmic Lynx, to get into the game. This only increases the geographic distribution of BEC attack sources.”</div><div style="text-align:left;"><br></div><div style="text-align:left;"><span style="color:inherit;"><div><div>BEC attacks are extremely profitable, so criminals put a great deal of effort into refining their tactics. New-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> can help your employees thwart targeted <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.</div></div><div><br></div><div><div>Agari has the <a href="https://www.agari.com/cyber-intelligence-research/whitepapers/acid-agari-geography-of-bec.pdf" title="story." target="_blank" rel="">story.</a></div></div></span></div></div>
</div><div data-element-id="elm_tK8yINOrPhpNtREks1Ns7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tK8yINOrPhpNtREks1Ns7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:30px;">Get Your&nbsp;<strong>CEO Fraud Prevention Manual</strong></span></span></h2></div>
<div data-element-id="elm_bCdbvvXYSh9aiuSeua-q-w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_bCdbvvXYSh9aiuSeua-q-w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/KB4%20CEO%20Fraud%20Prevention.png" size="small" data-lightbox="false" style="width:656px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div></div><div data-element-id="elm_lEp-uv4gTCuhNq9j3EWXoA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lEp-uv4gTCuhNq9j3EWXoA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 03 Nov 2020 13:32:08 +0000</pubDate></item></channel></rss>