December Threat Brief: Avoid a Bleak Midwinter! Stay Safe Through the End of 2016 (and in 2017!)

Posted by Greg Mancusi-Ungaro

Thu, Dec 01, 2016

 

There is no doubt that 2016 has been an epic cyber year. Fraudsters have become more sophisticated, and exploits have become more numerous, and more brazen.
But it isn't over yet.

Stay on track through the new year!
Don't slip off the road.

The December Executive Threat Brief provides you with ten actionable cyber tips that will help keep you and your family safe from on-line dangers in the remaining weeks of the year.

Put them into practice now, and keep them going in 2017. 

The December Threat Brief covers a lot of ground, but each of the tips is easy to implement. It's likely that you are already taking some of these precautions. But possibly not all of them. Take action to stay safe. 

BrandProtect Executive Threat Briefs are designed to minimize your exposures by educating you and your team about simple steps you can take to protect your personal information online. Remember, the easiest threat to stop is the one that you are not exposed to. 


Read More

Topics: Phishing, cybercrime, social media, cyber threats, mobile malware, Spear Phishing, Social Engineering, ThreatBrief

It's not Fake News...It's a Content-based Cyber Attack.

Posted by Greg Mancusi-Ungaro

Wed, Nov 23, 2016

 

Facebook and Twitter have been talking a lot about fake news recently.
And so have a lot of other people. Depending upon who you read, and who you believe, fake news played a major role in the recent presidential election. But fake news isn't limited to politics. Fake news, and its relatives, are some of the most vexing types of external cyber attacks facing corporations, institutions and enterprises. 

“Fake news” can originate practically anywhere on the Internet -- through tweets, posts, blogs, wikis, discussion forums, chats, podcasts, digital images, video, audio files, advertisements and more.  There are even official "citizen journalist" sides like CNN's iReport or reddit, where end-users can directly publish their views, or their content, without fact-checking, editing, or any other kind of content-curation. 

This un-proctored, un-curated, un-fact-checked content creates a nightmare for enterprises.  These are content-based cyber attacks that don’t touch company infrastructure at all. They exist completely outside the firewall, beyond the traditional perimeter. But even without touching the targeted company directly these attacks can have huge impacts on a company’s revenues, operations, and reputations....

Read More

Topics: Social Media Monitoring, cyber threats, External Threat, Content-based Cyber Attack, Cyber Attack

Massive Mobile App Fraud Kicks Off Black Friday Cyber Exploits

Posted by Greg Mancusi-Ungaro

Mon, Nov 07, 2016

Just as the cyber-election manipulators are finishing their work, the "for-profit" population of on-line fraudsters are coming online -- launching their efforts to bilk the public between now and November 25, Black Friday, the peak of heaviest online shopping day of the year.

Mobile app fraud is dominating the first wave of this year's Black Friday cyber attacks. First reported in the New York Post, and further reported in the New York Times, a slew of imitation and copycat mobile apps have appeared online in the last few weeks - parodying trusted brands such as Dollar Tree and Foot Locker, iconic stores like Dillard’s and Nordstrom, online retailers like Zappos.com and Polyvore, and luxury-goods purveyors Jimmy Choo, Christian Dior and Salvatore Ferragamo.

What makes this wave of fraudulent applications different is the targeted platform: Apple's iOS.

Historically, the bulk of fraudulent mobile apps detected and analyzed by BrandProtect and other vendors have appeared on various android platforms and have been distributed via third party and offshore app stores.  Not so with these rogue apps -- these have been discovered on the official Apple App Store.

Read More

Topics: black friday, mobile app monitoring, cyber monday, mobile malware, CISO, External Threat

Cyber Mayhem in the 2016 Election?  You Betcha!

Posted by Greg Mancusi-Ungaro

Wed, Nov 02, 2016

Download the FREE BrandProtect eBOOK

CYBER SECURITY IMPLICATIONS OF ELECTION 2016

A Practical Guide for Business Leaders (or Politicians) to Protect
Themselves from Cyberattacks and Misinformation

The 2016 campaign has not only dramatically shifted perceptions
of politics and society, but also revealed the immediate and future challenges that face cybersecurity and digital governance professionals.  

In this eBOOK from BrandProtect, Greg Mancusi-Ungaro and Dylan Sachs chronicle some the spectacular cyber exploits that highlighted the elections, and how they serve as a object lessons for CISOs and Digital Governance professionals everywhere.  

Read More

Topics: 2016 Elections

November Threat Brief: Risk Ahead!

Posted by Greg Mancusi-Ungaro

Tue, Nov 01, 2016

 

From Elections Exploits to Bogus Black Friday Promotions, November is a holiday season for Cyber Criminals!

This month's BrandProtect Executive Threat Brief focuses in on the many traps that cyber criminials will set for you during this crazy time. Some will spring from the upcoming elections, others will be retail-shopping related, but all will be dangerous! 

Download this month's threat brief and learn more!

Read More

Topics: black friday, cyber monday, 2016 Elections, ThreatBrief

The IoT Attack is Fascinating. It Puts Even More Emphasis on External Threats.

Posted by Greg Mancusi-Ungaro

Tue, Oct 25, 2016

Last Friday, cyber security experts were on the edge off their seats, mouths agape, as they monitored the progress (and effectiveness!) of the DDoS attack on Internet infrastructure provider DYN.  Last week’s attack differed from past attacks because the attacks were launched not from traditional devices, but from 10s of millions of discrete devices. Here’s what DYN said about the attack in their official statement of 10/21/2016:

At this point we know this was a sophisticated, highly distributed attack involving 10s of millions of IP addresses. We are conducting a thorough root cause and forensic analysis, and will report what we know in a responsible fashion. The nature and source of the attack is under investigation, but it was a sophisticated attack across multiple attack vectors and internet locations. We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.

Today, 48+hours removed from the original attack, we know a lot more... 

Read More

Topics: Social Media Monitoring, cyber threats, External Threat, IoT

Reacting to Yahoo: How to play defense against Yahoo-inspired attacks

Posted by Greg Mancusi-Ungaro

Mon, Oct 03, 2016

Whether or not the Yahoo hack affected you directly, you can be sure that cyber criminals are using the news to propel a new wave of cyber attacks that probably will. 

The October BrandProtect Executive Threat Brief anticipates those attacks, and gives you and your family a quick primer on what you can do to stay safe during this new "phishing season". 

Read More

Topics: data breach, Phishing, cybercrime, ThreatBrief

Thanks to Yahoo!, there are 500,000,000 new reasons CISOs should think more about external threats

Posted by Greg Mancusi-Ungaro

Fri, Sep 23, 2016

 

Sad to say, but yesterday's Yahoo! news could not have been that surprising. Yahoo joins LinkedIn, Gmail, Twitter and Facebook in the pantheon of leading social networks that have suffered (very public) large-scale data breaches. Healthcare providers like Anthem, Blue Cross and many others are also members of this exclusive club. 500 million records is a lot of records, but truly, it's getting to the point where the world is awash in stolen records....

It is also not surprising that many the stories appearing today highlight the steps a company should take AFTER it has been hacked, like this one on MSNBC.  But do stories like these really solve anything?

Pundits are fond of saying "it's not IF you'll get hacked, but WHEN you'll get hacked," but that doesn't mean that enterprise security teams should roll over and await their fate. There are lots of things that enterprises can do BEFORE they get hacked that should reduce their risks from a large number of external threats...

Read More

Topics: data breach, Phishing, Spear Phishing, CISO, External Threat, Executive Threat, Masquerades

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

  Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all