Trend Micro researchers uncovered a sextortion scheme targeting Italian-speaking users. The scheme is notable in that the hackers are now also using Bitcoin Cash as one of their preferred cryptocurrencies.
Phishing: Phishing is a form of identity theft in which a scammer uses an authentic-looking email from a legitimate business to trick recipients into giving out sensitive personal information. Read more
A business email compromise (BEC) scheme took more than $100 million from Facebook and Google. Legitimate-looking invoices, contracts and more fooled the two tech companies and they wired millions to the fraudsters over a period of years.
Google posted that they removed more than 2 billion fraudulent ads and accounts, and will release an ads policy manager in April to guide legitimate advertisers and publishers for compliant ad campaigns.
As cybersecurity technology becomes better at detecting email-based threats, attackers continue to employ leveled up social engineering tactics – such as phishing – to increase the likelihood of users falling for fraud, identity theft, or spoofing.
To provide organizations a comprehensive view of the email threat landscape, we look at notable occurrences of advanced email threats used by cybercriminals as well as advanced security techniques that can effectively defend against them.