tag = "BEC"

The Most Prevalent Threats to Corporate Inboxes

In this post, we discuss the top threat types reaching corporate inboxes, and what these attacks mean for security teams.

APWG Q3 Report:Four Out of Five Criminals Prefer HTTPS

Highlights from the report include more than two hundred thousand unique phishing websites detected in August and September, SSL encryption for phishing sites overtaking SSL deployment for general websites, and a 10 percent increase in BEC attacks originating from free webmail accounts.

$2.3M Stolen from Wisconsin GOP via BEC Attack

$2.3M in election funds were recently stolen from the Wisconsin GOP by a BEC scam that altered vendor invoices.

APWG: SSL Certificates No Longer Indication of Safe Browsing

Key highlights of the report include a significant increase in wire transfer loss attributed to business email compromise (BEC) attacks from the first quarter and a 20% increase in BEC attacks targeting the social media sector.

APWG Year-End Report: 2019 A Roller Coaster Ride for Phishing

APWG's Q4 report shows ups and downs for 2019 phishing attacks, with SSL sites, web email, social media and BEC as the top trends.

New White Paper: BEC Attacks are the Most Costly Form of Phishing

Download our latest white paper to understand BEC attacks are the most costly form of phishing.

APWG: Phishing Continues to Rise, Threat Actors Love Gift Cards

APWG's Q2 report shows phishing increasing, SaaS industry prime target, and threat actors are after gift cards.

BEC Attacks: A Closer Look at Invoice Scams

Why do Invoice Scams, a form of phishing attack, constantly bypass email security technology? The lack of attachments and links.

How Spear Phishing Makes BEC Attacks So Effective

When threat actors research their victims and use that intelligence, it makes their phishing attacks just that much more effective.

How Business Email Compromise (BEC) Attacks Impact Everyone

BEC or Business Email Compromise Attacks are some of the most effective and costly forms of phishing.

All Phish are Not Created Equal: The Evolving BEC Scam

As cybercriminals evolve their attack methodologies, they have learned from their mistakes and BEC is an unfortunate example of how they are circumventing technology defenses and exploiting organizations' greatest vulnerability: employees.

Olympic Vision Keylogger and BEC Scams

The ease of buying low cost, pre-built tools broadens the range of potential targets in BEC attacks. This blog discusses one of these tools - Olympic Keylogger.