<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.actisofttechnology.com/blogs/training/feed" rel="self" type="application/rss+xml"/><title>ActiSoft Technology - Blog , Training</title><description>ActiSoft Technology - Blog , Training</description><link>https://www.actisofttechnology.com/blogs/training</link><lastBuildDate>Thu, 23 Apr 2026 21:14:39 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Email Phishing Is Now the Top Ransomware Attack Vector]]></title><link>https://www.actisofttechnology.com/blogs/post/email-phishing-is-now-the-top-ransomware-attack-vector</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/gece6dad77d9292cce60b789c478b49225ff884e5f75d18547b5cc7eacf23877f378d3640680dd95b5118e1d63d88378a400a0f42613c32f7d45719d1229f1fac_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman New data shows that pushback from the ransomware victim “market” may be influencing just how much cyb ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_DxSkgqeyTja8FbRk_B8nQA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lQe-g06uSnSDGy75rb786w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_qb1CNqB6Sg2-Erndq57AsA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KxoDLkZLRQ7Oc0oVSxCB2A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KxoDLkZLRQ7Oc0oVSxCB2A"].zpelem-text { border-radius:1px; margin-block-start:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_Ung3nqbPXHk7XBYMnSpMgQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_Ung3nqbPXHk7XBYMnSpMgQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Ransomware%20Attack%20Vectors.png" size="small" data-lightbox="true" style="width:600px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>New data shows that pushback from the <a href="/ransomware" title="ransomware" target="_blank" rel="">ransomware</a> victim “market” may be influencing just how much cybercriminals are asking for as ransom and are being paid.</div></div><p><br></p><div>2020 seemed to point to ransomware continuing to grow in devastation and cost; Ryuk reached a $34 million ransom payout, organisations were operationally brought to their knees by many of the prominent ransomware families, and the “as-a-Service” market for various parts of ransomware attacks – including the publishing of exfiltrated data – grew in interest.&nbsp;</div></div>
</div></div><div data-element-id="elm_M5499aOE-8eWBanyOKEDDw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_M5499aOE-8eWBanyOKEDDw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>But new data from security vendor Coveware in their <a href="https://www.coveware.com/blog/ransomware-marketplace-report-q4-2020" title="Q4 2020 Quarterly Ransomware Report" target="_blank" rel="">Q4 2020 Quarterly Ransomware Report</a> shows that <span style="font-weight:700;"><a href="/what-is-phishing" title="phishing" target="_blank" rel="">phishing</a> is now the prominent ransomware attack vector</span> since RDP compromise is being prevented by potential victims.&nbsp;</div></div>
</div><div data-element-id="elm_jsV-bUMU8yW2eyNVC41JgA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_jsV-bUMU8yW2eyNVC41JgA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LM1T8XXlgGAYXd4FHclwhQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LM1T8XXlgGAYXd4FHclwhQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_LtZeWmjqMF-jsTgGnMrlqg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_LtZeWmjqMF-jsTgGnMrlqg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Ransomware%20Attack%20Vectors.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div><div data-element-id="elm_EVRbOZK-jlTpVAK4jb7edw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_EVRbOZK-jlTpVAK4jb7edw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_wzB81w7qahs6CReeSPuo0g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wzB81w7qahs6CReeSPuo0g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="original"/></picture></a></figure></div>
</div></div></div><div data-element-id="elm_ZV7mWEPg6BnLNu1FG-Lmhw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZV7mWEPg6BnLNu1FG-Lmhw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>There are also some shifts in payment amounts – fortunately in the favour of the victim organisations.</div><div><br></div><div>According to the report:</div><div><ul><ul><li>The average ransom payment decreased 34% in Q4 of 2020 to $154,108 from $233,817 in Q3</li><li>The median payment also decreased by 55% in the same timeframe from $110,532 to $49,450</li><li>Threats to disclose exfiltrated data stepped up in Q4, with a whopping 70% of ransomware attacks using this tactic (up from 50% in Q3)</li></ul></ul><div><span style="color:inherit;"><div><br></div><div>Coveware speculate this decline in payment amounts is due to the ability for organisations to better recover their locked environment. And with Coveware seeing that exfiltrated data doesn’t appear to be credibly destroyed by the cybercriminal (and instead appear to be found in the hands of multiple parties, implying it’s been sold on the dark web), there is less emphasis on the option to pay the ransom and stop the publishing of the stolen data.</div><br><div>Phishing took over from RDP as the top overall initial attack vector, with the top attack vector varying between ransomware families. RDP picked up steam during the pandemic as many organisations sought to quickly provide remote access to their now remote workforce. Phishing has moved up as the quickest route to get malicious code into an organisation and in front of an unwitting victim user.</div><br><div><div>If you haven’t heard it yet: stop using Internet-facing RDP. Changing the ports isn’t enough; it’s time to pick another more secure technology. And for phishing, many ransomware attacks continue to make it through your email filters. You need to block attacks that have made it in your users' inbox. Turn your users into a strong human firewall with new-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> and enable your users to make smart security decisions every day.&nbsp;</div></div></span></div></div></div>
</div><div data-element-id="elm_v03Ff32IbB-CmTv3JHLYCQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_v03Ff32IbB-CmTv3JHLYCQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-weight:700;">Ransomware Has Gone Nuclear</span>, How Can You Avoid Becoming The Next Victim?</h2></div>
<div data-element-id="elm_KgCsJNN0NvjorkEugoyY1Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KgCsJNN0NvjorkEugoyY1Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximise your organisation’s potential damage and their payoff.</div><p><span style="color:inherit;"><br></span></p><div>After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.</div></div>
</div><div data-element-id="elm_41uB3LiL795wwN7hnd_sVA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_41uB3LiL795wwN7hnd_sVA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g18d5c0b56583e81225cdee264621ea7c6e40fa074173c8a6f782e04be9e9c896b203376b10cb84bf39968a3d555ebe2214b1b052174ac4cb0d7a5f867aa15d04_1280.jpg" size="medium" data-lightbox="true" style="width:1280px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, dives into:</div><div><ul><ul><li>Why data backups (even offline backups) won’t save you</li><li>Evolved threats from data-theft, credential leaks, and corporate impersonation</li><li>Why ransomware isn’t your real problem</li><li>How your end users can become your best, last line of defence</li></ul></ul></div></div>
</div></div><div data-element-id="elm_NBXDhDCcQxuTMF1pcp8BZg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_NBXDhDCcQxuTMF1pcp8BZg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/nuclear-ransomware?hsCtaTracking=b84fe87c-034f-4f1e-bd1e-c0602e6d094d%7C1edd4585-1fde-47ba-b3dc-e5a4ce858768" target="_blank"><span class="zpbutton-content">Watch Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 03 Feb 2021 15:07:20 +0000</pubDate></item><item><title><![CDATA[All 200 Million Office 365 Users at Risk by a New Global Spear Phishing Attack Spoofing Microsoft.com]]></title><link>https://www.actisofttechnology.com/blogs/post/all-200-million-office-365-users-at-risk-by-a-new-global-spear-phishing-attack-spoofing-microsoft.co</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/51e6d34a4f50b108f5d084609629367b1638d6e3514c704f75277fd4974ac551_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman A new spear-phishing campaign appearing to come from a microsoft.com email address is t ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_teF-WLJRSeKSj0Uh6r1fBA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s4NFy0LhRhyI8_MBIMCBbg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gJhtP9zMShyiMd-V9P1_6Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_V8RF7clXN7mINnD7KZvnLw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V8RF7clXN7mINnD7KZvnLw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_bRgzQK5RXUomDUatkaEKBg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_bRgzQK5RXUomDUatkaEKBg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/55e8dd4a4b56ae14f6da8c7dda79367f103cd9ed55536c48732f73d79e4dc75dbd_1280.jpg" size="small" data-lightbox="true" style="width:768px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>A new <a href="/what-is-spear-phishing" title="spear phishing" rel="">spear-phishing</a> campaign appearing to come from a microsoft.com email address is targeting organisations in critical industries that use Office 365 for email to steal credentials.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
<p><br></p><div><div>A recent attack was spotted by <a href="https://ironscales.com/blog/Microsoft-O365-Fails-to-Block-Spoofed-Emails/" title="researchers at security vendor Ironscales" target="_blank" rel="">researchers at security vendor Ironscales</a> attacking Office 365 accounts belonging to organisations primarily in financial services, healthcare, insurance, manufacturing, utilities, and telecom sectors. This relatively simple attack appears to come from no-reply [at] microsoft.com informing the potential victim that certain email messages have been quarantined and that the victim needs to review the messages and determine whether to reclaim them or delete them. According to Ironscales, the language used in the phishing email is designed to create a sense of urgency – a common element in most scams.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div></div></div><div data-element-id="elm_OG_rS3OHNJd_ZSDn6LmIoA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_OG_rS3OHNJd_ZSDn6LmIoA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div> Upon clicking the provided link, users are taken to a spoofed Office 365 logon page where credentials are captured and stolen. </div>
<p><br></p><div><div>According to <a href="https://www.darkreading.com/threat-intelligence/phishing-campaign-targets-200m-microsoft-365-accounts/d/d-id/1339637" title="Dark Reading’s article on the attack" target="_blank" rel="">Dark Reading’s article on the attack</a>, a Microsoft spokesperson is quoted as saying “Contrary to claims in the third party report, Office 365 has rich in-built controls to block domain spoofing emails and enforces DMARC checks. We encourage all customers to make sure they have deployed the latest security controls in Office 365, enabled multi-factor authentication for Office 365, and train their end users to observe caution when clicking on links from unknown senders.&quot;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
<p><br></p><p>But given that Ironscales customers are seeing this attack, it’s evident that some are getting through to a user’s Inbox.</p><p><span style="color:inherit;"><br></span></p><div><div>What’s needed is to educate users via new school <a href="/security-awareness-training" title="Security Awareness Training" target="_blank" rel="">Security Awareness Training</a> on what elements of an unsolicited email should trigger their sense of suspicion. In this case, the urgency denoted to simply review some emails that may or may not be important.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</div></div>
</div></div></div><div data-element-id="elm_baTP6YWtEKpEgx2SP6rlwA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_baTP6YWtEKpEgx2SP6rlwA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Phishing Security Test</span></h2></div>
<div data-element-id="elm_Sc-mdVZqyW1DfNwrU9V-BA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Sc-mdVZqyW1DfNwrU9V-BA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></p></div>
</div><div data-element-id="elm_KBUitpLUy57MthuMmw8a9w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_KBUitpLUy57MthuMmw8a9w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-weight:700;">Here's how it works:</span></p><div><ul><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone)</li><li>Select from 20+ languages and customise the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></ul></div></div>
</div></div><div data-element-id="elm_hjhPoSqdRiC5DvGGFbZNNg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_hjhPoSqdRiC5DvGGFbZNNg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 19 Dec 2020 17:58:40 +0000</pubDate></item><item><title><![CDATA[Number of Phishing Websites Double and Unique Phishing Campaigns Triple in Q3]]></title><link>https://www.actisofttechnology.com/blogs/post/number-of-phishing-websites-double-and-unique-phishing-campaigns-triple-in-q3</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/55e9d6404a52a814f6da8c7dda79367f103cd9ed55536c48732f7cd49649c051bc_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman New data shows the bad guys have been working diligently to step up thei ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4E_4eVhXR0GoN3rXqKDlGA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ME2XInNdSNibNkOGKlTMSw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ljSttiVcT4ipsP0LIgE5_g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZxkJk0hR9_c7j8o4knkFtA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZxkJk0hR9_c7j8o4knkFtA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div></div>
</div><div data-element-id="elm_3HF5080JURtLCGiUmQ9Dkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_3HF5080JURtLCGiUmQ9Dkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/security-awareness-training" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1518186233392-c232efbf2373?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDZ8fHxlbnwwfHx8&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="medium" data-lightbox="false" style="width:1080px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>New data shows the bad guys have been working diligently to step up their game on both the front and back end of <a href="/what-is-phishing" title="phishing attacks" target="_blank" rel="">phishing attacks</a>, despite still being mid-pandemic.</div>
</div><div><br></div><div>As we move towards the end of the calendar year, we’re all wondering what next year is going to hold. If this latest phishing trend data is any indication, next year is going to prove to be the year of the “phish.”</div>
<p><span style="color:inherit;"><br></span></p><div><div>According to the Anti-Phishing Working Group’s <a href="https://apwg.org/trendsreports/" title="Phishing Activity Trends Report" target="_blank" rel="">Phishing Activity Trends Report</a> for the 3rd quarter of 2020, phishing attacks are materially on the rise:</div>
</div></div></div></div><div data-element-id="elm_bCm6ZopF1yXKkY-gtKtDBw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_bCm6ZopF1yXKkY-gtKtDBw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" size="small" data-lightbox="false" style="width:300px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><ul><li>Q3 saw 572K unique websites used for phishing purposes. This is a 115% increase from the 3rd quarter last year and 289% increase from Q2 of this year.</li><li>Q3 saw 367K unique phishing campaigns, over triple the 118K seen the same time last year and 128K in Q2 of this year</li></ul><p><span style="color:inherit;"></span></p><div><span><div>Interestingly the number of brands targeted by phishing campaigns rose, but not as sharply as the number of websites and campaigns. In Q3, there were over 1500 brands targeted, only up 21% from 1283 in Q3 of last year.</div><br><div>One of the most effective ways to thwart phishing attacks is to educate the user via&nbsp;<a href="https://sitebuilder-20068019420.zohositescontent.eu/security-awareness-training" target="_blank" rel="">Security Awareness Training</a>&nbsp;on the current methods,&nbsp;<a href="https://sitebuilder-20068019420.zohositescontent.eu/social-engineering" target="_blank" rel="">social engineering</a>&nbsp;tactics, and campaign themes so users can easily spot a potentially harmful email and avoid engaging with it and assisting in its’ success.</div></span></div></div>
</div></div><div data-element-id="elm_kA60xrZfQ4mDS8yDnqTfNw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kA60xrZfQ4mDS8yDnqTfNw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Free <span style="font-weight:700;">Phishing Security Test</span></h2></div>
<div data-element-id="elm_LmCZmxVz64SbYo7S6egc6Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LmCZmxVz64SbYo7S6egc6Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.</span><br></p></div>
</div><div data-element-id="elm_QbgOTIDgl9oNCe1VbXIxcQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_QbgOTIDgl9oNCe1VbXIxcQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/Picture3.png" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Here's how it works:</div><div><ul><ul><li>Immediately start your test for up to 100 users (no need to talk to anyone) but you can if you want</li><li>Select from 20+ languages and customize the phishing test template based on your environment</li><li>Choose the landing page your users see after they click</li><li>Show users which red flags they missed, or a 404 page</li><li>Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management</li><li>See how your organisation compares to others in your industry</li></ul></ul></div></div>
</div></div><div data-element-id="elm_tmP96hGDTzyYuQwND4-hSg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_tmP96hGDTzyYuQwND4-hSg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://info.knowbe4.com/phishing-security-test-partner?partnerid=0010c00001ywD8SAAU" target="_blank"><span class="zpbutton-content">Go Phishing Now!</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 03 Dec 2020 16:57:02 +0000</pubDate></item><item><title><![CDATA[A Hacker Is Selling Access To The Email Accounts Of Hundreds Of C-Level Executives]]></title><link>https://www.actisofttechnology.com/blogs/post/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-954712690.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman ZDNet's Zero Day column just reported one of the best reasons why you sh ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3Cy6pD-xR72mR5jNB9mQ1A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_d7IjBOiYTZySFuzvFAZdvg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IBI7XLf7TSSy97jVR5Mhqw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bDNBZXuAY3pQbwsCl5E_FA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bDNBZXuAY3pQbwsCl5E_FA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:14px;">Blog courtesy of KnowBe4</span></div><p><span style="font-size:14px;">Written by Stu Sjouwerman</span><br></p></div>
</div><div data-element-id="elm_pTQtRM8bRJGC4_8FKZAqJw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pTQtRM8bRJGC4_8FKZAqJw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Great for Marketing Purposes and for Phishing!</h2></div>
<div data-element-id="elm_qVyB3KifLDH3rt_akc6I4g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width: 500px ; height: 331.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width:500px ; height:331.25px ; } } @media (max-width: 767px) { [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"] .zpimagetext-container figure img { width:500px ; height:331.25px ; } } [data-element-id="elm_qVyB3KifLDH3rt_akc6I4g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/one-on-one-demo-partners?partnerid=0010c00001ywD8SAAU" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/57e5d4454950a514f6da8c7dda79367f103cd9ed55536c48732f7ddc954cc559bd_1280.jpg" width="500" height="331.25" loading="lazy" size="medium" data-lightbox="true" style="width:1280px !important;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>ZDNet's Zero Day column just reported one of the best reasons why you should step your users through <a href="/security-awareness-training" title="new-school security awareness training" target="_blank" rel="">new-school security awareness training</a> yet:</div>
</div><p><br></p><div>&quot;A threat actor is currently selling passwords for the email accounts of hundreds of C-level executives at companies across the world. The data is being sold on a closed-access underground forum for Russian-speaking hackers named Exploit.in, ZDNet has learned this week.&nbsp; The threat actor is selling email and password combinations for Office 365 and Microsoft accounts, which he claims are owned by high-level executives occupying functions such as:</div>
</div></div></div><div data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width: 300px !important ; height: 600px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } @media (max-width: 767px) { [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"] .zpimagetext-container figure img { width:300px ; height:600px ; } } [data-element-id="elm_vPS2FUdLnb2dAVzB7s8HnQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://info.knowbe4.com/demo_kcm_partner?partnerid=0010c00001ywD8SAAU" target="_blank" title="Book a Demo!" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Other/KCM_Demo.jpg" width="300" height="600" loading="lazy" size="original" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><ul><ul><li>CEO - chief executive officer</li><li>COO - chief operating officer</li><li>CFO - chief financial officer or chief financial controller</li><li>CMO - chief marketing officer</li><li>CTOs - chief technology officer</li><li>President</li><li>Vice president</li><li>Executive Assistant</li><li>Finance Manager</li><li>Accountant</li><li>Director</li><li>Finance Director</li><li>Financial Controller</li><li>Accounts Payable</li></ul></ul></div>
</div></div><div data-element-id="elm_LR6-vUFBWth14o56nO-CCA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LR6-vUFBWth14o56nO-CCA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Access to any of these accounts is sold for prices ranging from $100 to $1,500, depending on the company size and user's role. A source in the cyber-security community who agreed to contact the seller to obtain samples has confirmed the validity of the data and obtained valid credentials for two accounts, the CEO of a US medium-sized software company and the CFO of an EU-based retail store chain.</div><br><div>The source, which requested that ZDNet not use its name, is in the process of notifying the two companies, but also two other companies for which the seller published account passwords as public proof that they had valid data to sell. These were login details for an executive at a UK business management consulting agency and for the president of a US apparel and accessories maker.</div><br><div><div>I don't have to tell you the risks that this brings related to <a href="/what-is-ceo-fraud" title="CEO Fraud" target="_blank" rel="">CEO Fraud</a>, also known as Business Email Compromise. ZDNet has the <a href="https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/" title="full story." target="_blank" rel="">full story.</a></div></div></span></div></div>
</div><div data-element-id="elm_4O5nf_I8W5ITNweKrSGxoQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4O5nf_I8W5ITNweKrSGxoQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Get Your <span style="font-weight:700;">CEO Fraud Prevention Manual</span></h2></div>
<div data-element-id="elm_DG2siLEIQ9a8lcfVE7HcyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DG2siLEIQ9a8lcfVE7HcyQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div><div data-element-id="elm_q61azXnJQ-yb3kDjVydMjQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_q61azXnJQ-yb3kDjVydMjQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://forms.zohopublic.eu/actisofttechnologycom/form/CEOFraudPreventionManual/formperma/whtiWN4rVXw7uGo_frJIG9N8AyOoV4_0hX7_IQltdMg?referrername=kb4ceofraud_whitepaper" target="_blank" title="CEO Fraud Manual"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div><div data-element-id="elm_5dkEERrHJoSP04toUSVAzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5dkEERrHJoSP04toUSVAzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Want to know and monitor the Dark Web for your organisations credentials? Check out our <a href="/domainwatch" title="DomainWatch" target="_blank" rel="">DomainWatch</a> service</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Dec 2020 11:15:21 +0000</pubDate></item><item><title><![CDATA[Threat Actors Take Advantage of Exchange Online and Outlook on the Web with New Levels of Sophistication]]></title><link>https://www.actisofttechnology.com/blogs/post/threat-actors-take-advantage-of-exchange-online-and-outlook-on-the-web-with-new-levels-of-sophistica</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/Images/Small/iStock-936338884.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman New insight from Accenture Security highlights specific ways attackers are changing their tactics to ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_wR0GAjXeSPCjbwIIcnc5jA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7ipl7eUpQ0uhUfc2ml98NQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nxEIEsz8QP-ASIrnV-tkJw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_MKnNBEjBAYk7ZayKu0bNmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MKnNBEjBAYk7ZayKu0bNmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Blog courtesy of KnowBe4</span></p><p></p><p><span style="color:inherit;"></span></p><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_I4l8vO1fbvDVZYvPRowJXw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_I4l8vO1fbvDVZYvPRowJXw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1504639725590-34d0984388bd?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="small" data-lightbox="true" style="width:1080px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>New insight from Accenture Security highlights specific ways attackers are changing their tactics to make Microsoft’s email platform a tool rather than an obstacle for <a href="/what-is-phishing" title="phishing" rel="">phishing</a> attacks.</div></div><div><br></div><div><div>We all tend to think of our email platform as something that helps create a more secure environment four our networks. But new disturbing information found in Accenture’s <a href="https://www.accenture.com/_acnmedia/PDF-136/Accenture-2020-Cyber-Threatscape-Full-Report.pdf" title="2020 Cyber Threatscape Report" target="_blank" rel="">2020 Cyber Threatscape Report</a> shows that, in the wild, parts of Microsoft Exchange (and Exchange Online), as well as Outlook Web Access are being used as part of sophisticated phishing campaigns:</div></div></div>
</div></div><div data-element-id="elm_tDrrvUW6RWS0SRAULpr38w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tDrrvUW6RWS0SRAULpr38w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;"><span style="color:inherit;"><ul><ul><li><span style="color:inherit;">Threat groups like Belugasturgeon are hiding within Exchange traffic to obfuscate both command relays and data exfiltration</span></li><li><span style="color:inherit;">Hackers are attempting to gain access to Exchange servers responsible for the Client Access Server role to deploy web shells that facilitate the harvesting of credentials during an Outlook on the Web session.<br></span></li><li><span style="color:inherit;"><p>Belugasturgeon even went as far as to register one of their pieces of code as a Microsoft Exchange Transport Agent (reputable transport agents include antivirus, mail filtering, etc.) so that they could gain access to email passing through Exchange and be able to create, modify, or delete messages.</p></span></li></ul></ul><div><br></div><div><span style="color:inherit;"><div>This level of sophistication makes it clear that the bad guys are willing to do whatever it takes to gain access to your credentials and email.</div><div><br></div><div>While the means to mitigate the issues mentioned above likely revolves around keeping any Exchange systems you still manage up to date with patching, it’s still important that users be vigilant around any abnormal communications issues – emails not being received by an intended recipient or not receiving an email from an external party could both be signs that, (assuming the user in question is involved with either a financial aspect of the organisation, intellectual property, customer data, or employee information) a bad guy could be messing with your email conversations and inserting themselves in a case of business email compromise.</div></span></div></span></div></div>
</div><div data-element-id="elm_dyscqCgLNaTU1ZHyJOn1eA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dyscqCgLNaTU1ZHyJOn1eA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:30px;">Get Your&nbsp;<strong>CEO Fraud Prevention Manual</strong></span></span></h2></div>
<div data-element-id="elm_uBsw9lssxU91Zsw2himwWQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_uBsw9lssxU91Zsw2himwWQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank" title="Get Your Manual" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/KB4%20CEO%20Fraud%20Prevention.png" size="small" data-lightbox="false" style="width:656px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div></div><div data-element-id="elm_dO10dHElSKSeC__Ag2f44Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_dO10dHElSKSeC__Ag2f44Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 04 Nov 2020 09:04:00 +0000</pubDate></item><item><title><![CDATA[The Geography of Business Emails Compromise]]></title><link>https://www.actisofttechnology.com/blogs/post/the-geography-of-business-emails-compromise</link><description><![CDATA[<img align="left" hspace="5" src="https://www.actisofttechnology.com/images/55e3dc434f53a414f6da8c7dda79367f103cd9ed55536c48732f7fd0964dc45db0_1280.jpg"/>Blog courtesy of KnowBe4 Written by Stu Sjouwerman Researchers at Agari have released a report on the global distribution of business email compromise ( ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_V_QaXgNTS3uGMKHKo2OVDw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_A4P9MBOIRrGrDzLT-tWmHA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nM4d_UTQTy-1Q8Zqn9d2WQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Fy8OTJFRFwGgDAIMZwl3pA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Fy8OTJFRFwGgDAIMZwl3pA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:14px;">Blog courtesy of KnowBe4</span></p><p><span style="color:inherit;"></span></p><p><span style="font-size:14px;">Written by Stu Sjouwerman</span></p></div>
</div><div data-element-id="elm_eNQaOCRKnZhKxaOxMAEeFw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_eNQaOCRKnZhKxaOxMAEeFw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Small/iStock-622776790.jpg" size="small" data-lightbox="true" style="width:702px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Researchers at Agari have released a report on the global distribution of business email compromise (BEC) actors, and determined that 25% of these criminals are operating from within the United States. This makes the US the second-largest hub for BEC actors in the world. Criminals in Nigeria still account for the vast majority of BEC attacks, at 50% of the global total. South Africa was third, with criminals there responsible for 9% of these attacks. Agari’s researchers based their findings on incidents in which the attackers failed to anonymise their real-world locations.</span><br></p></div>
</div></div><div data-element-id="elm_qOMWkDE4Q96R7fRG16Tusg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qOMWkDE4Q96R7fRG16Tusg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="text-align:left;">“A quarter of the BEC actors we identified globally were located in the US, operating in 45 states and the District of Columbia,” Agari says. “Nearly half these scammers were located in five states: California, Georgia, Florida, Texas, and New York Many of the BEC actors in our dataset were clustered around a handful of US cities. The largest of these were based in and around Atlanta, GA, with 7% of all US-based BEC actors operating in this metropolitan area.”</div><p style="text-align:left;"><br></p><div style="text-align:left;">The US government isn’t letting these actors operate unperturbed—the Justice Department has arrested dozens of people allegedly involved in these schemes. Still, the number of BEC attacks originating in the US is notable, considering that Europe only accounts for 6%, the Middle East for 4%, and the Asia-Pacific for 2%.</div><p style="text-align:left;"><br></p><div style="text-align:left;">“It’s well-known that organizations within the United States are preferred targets for BEC actors. Some groups our team has researched, such as Exaggerated Lion, have exclusively targeted US-based businesses, for instance. But it may be surprising to some that a quarter of all BEC actors operate from within the US.”</div><p style="text-align:left;"><br></p><div style="text-align:left;">Agari adds that BEC activity is on the rise in other countries as well.</div><p style="text-align:left;"><br></p><div style="text-align:left;">“Because of the impact of BEC attacks globally, law enforcement in Nigeria has become more aggressive in recent years, which has caused BEC actors to migrate to other countries,” the researchers write. “Additionally, the significant return on investment from BEC scams has led far more sophisticated Eastern European cybercrime groups, like Cosmic Lynx, to get into the game. This only increases the geographic distribution of BEC attack sources.”</div><div style="text-align:left;"><br></div><div style="text-align:left;"><span style="color:inherit;"><div><div>BEC attacks are extremely profitable, so criminals put a great deal of effort into refining their tactics. New-school <a href="/security-awareness-training" title="security awareness training" target="_blank" rel="">security awareness training</a> can help your employees thwart targeted <a href="/social-engineering" title="social engineering" target="_blank" rel="">social engineering</a> attacks.</div></div><div><br></div><div><div>Agari has the <a href="https://www.agari.com/cyber-intelligence-research/whitepapers/acid-agari-geography-of-bec.pdf" title="story." target="_blank" rel="">story.</a></div></div></span></div></div>
</div><div data-element-id="elm_tK8yINOrPhpNtREks1Ns7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tK8yINOrPhpNtREks1Ns7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:30px;">Get Your&nbsp;<strong>CEO Fraud Prevention Manual</strong></span></span></h2></div>
<div data-element-id="elm_bCdbvvXYSh9aiuSeua-q-w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_bCdbvvXYSh9aiuSeua-q-w"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/KB4%20CEO%20Fraud%20Prevention.png" size="small" data-lightbox="false" style="width:656px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.</span><br></p></div>
</div></div><div data-element-id="elm_lEp-uv4gTCuhNq9j3EWXoA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lEp-uv4gTCuhNq9j3EWXoA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://zfrmz.eu/JLTeKHYgnRz20VWzPiAx" target="_blank"><span class="zpbutton-content">Get Your Manual</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 03 Nov 2020 13:32:08 +0000</pubDate></item></channel></rss>