In accordance with the Australian Privacy Amendment made in 2017 to the Privacy Act of 1988, the Office of the Australian Information Commissioner (OAIC) reports statistics on cybersecurity incidents and breaches. Find out what it said.
The latest evolution in phishing is the Modlishka tool, which provides the attacker a simple tool to use a reverse proxy to place the attacker between the user and the target site. The user’s traffic passes through the tool and can capture SMS-based 2FA tokens. Here, we look at how to counter modern phishing attacks with strong 2FA and a defense in depth strategy.
The top malware infection vector is our age-old friend, phishing, while stolen credentials are popular for lateral movement - see more insights from Symantec's latest Internet Security Threat Report.
In a technical paper released today, Duo Labs details the results of a month-long experiment in which we hunted and analyzed over 3,200 unique phishing kits.
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.