Remove Accountability Remove Phishing Remove Webinar
article thumbnail

Protecting MSPs From Helpdesk Phishing

Duo's Security Blog

In recent webinar Preventing Helpdesk Phishing with Duo and Traceless , Duo PMM Katherine Yang sat down with Gene Reich, Co-founder of Traceless to discuss why stronger identity verification is critical for MSPs and helpdesk teamsespecially with the increased accessibility of AI technologies driving identity fraud.

Phishing 111
article thumbnail

Webinar on cyberattacks in Ukraine – summary and Q&A

SecureList

About the webinar. We advise organizations to: Take typical measures against DDoS attacks, ransomware and destructive malware, phishing, targeted attacks, supply-chain attacks and firmware attacks. A: We commonly take TOR and other anonymizing services into account when it comes to the origin of attacks.

DDOS 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intro to Phishing: How Dangerous Is Phishing in 2023?

Duo's Security Blog

Through the first two months of 2023 alone, the Australian Competition and Consumer Commission’s Scamwatch reported more than 19,000 phishing reports with estimated financial losses of more than $5.2 What is phishing? This is part of what makes phishing attacks so dangerous.

Phishing 106
article thumbnail

Iran-linked Charming Kitten APT contacts targets via WhatsApp, LinkedIn

Security Affairs

The Iran-linked Charming Kitten APT group leveraged on WhatsApp and LinkedIn to carry out phishing attacks, researchers warn. Clearsky security researchers revealed that Iran-linked Charming Kitten APT group is using WhatsApp and LinkedIn to conduct spear-phishing attacks. Israel, Iraq, and Saudi Arabia.

Phishing 145
article thumbnail

Catching the Catphish: Join the Expert Webinar on Combating Credential Phishing

The Hacker News

Is your organization constantly under threat from credential phishing? Even with comprehensive security awareness training, many employees still fall victim to credential phishing scams. Cybercriminals gaining immediate and unhindered access to sensitive data, email accounts, and other applications. The result?

article thumbnail

WHEN IS CYBERSECURITY IS WEEK

Hacker's King

Activities during this week include engaging workshops, informative webinars, and community events, all designed to empower individuals with the knowledge and skills necessary to navigate today’s cyber threats effectively. Change them regularly and avoid reusing passwords across different accounts.

article thumbnail

Administrator’s Guide, Part 3: What Makes Passwordless, Dare We Say It, Phish-Proof?

Duo's Security Blog

But on top of all of that, passwordless should also raise the bar by substantially reducing or even eliminating the risk of phishing attacks. That isn’t to say that every password-less solution needs to be phish-proof. Doing anything else would make push phishing attacks viable.

Phishing 105