Podcast Episode 11 – Imposter Domain Phishing Attacks
In this podcast, Brian Stone and Anthony Johnson discuss phishing and the use of imposter domains in phishing attack campaigns.
This author has not written his bio yet.
But we are proud to say that Chad Anderson contributed 55 entries already.
In this podcast, Brian Stone and Anthony Johnson discuss phishing and the use of imposter domains in phishing attack campaigns.
A prolific Chinese threat actor is abusing people’s trust of brands to distribute malware and conduct fraud on a massive scale. The actor sends malicious links via WhatsApp, highlighting the growing threat of malicious links delivered via applications outside of email, where many anti-phishing protection measures are focused.
Despite new legislation and skyrocketing cyber security spending, government, health, and educational institutions saw no reduction in the number of successful ransomware attacks in 2022. These attacks have resulted in massive ransom payments that make it more difficult for these organizations to carry out their missions, and have even resulted in direct physical harm in medical settings. How can organizations fight back?
The latest ‘Twitter Files’ show the FBI and other government agencies were involved in years of content moderation, including flagging tweets as misinformation, and suspending accounts. CEO, Gordon Lawson, discusses the relationship between the tech giant and the FBI in more detail with Fox News.
Several new ransomware variants hit the Internet in 2022. Find out more about three of the most common ones, and see how ConcealBrowse can help provide ransomware protection against some of the most common delivery methods with dynamic next-generation remote browsing isolation and phishing protection built in.
A likely Russian advanced persistent threat actor has been utilizing phishing campaigns to steal credentials of Western military and strategic research targets. This attack uses an interesting social engineering trick as to circumvent common phishing protection tools. Find out how Conceal’s Internet browsing security solution incorporating dynamic remote browser isolation can help prevent similar attacks.
Neal Pollard, Partner at EY, joins Gordon Lawson, CEO, and Steve Morgan at Cybercrime Magazine to explain how geopolitics affect the cyber threat landscape, what CISOs can do to be more prepared, and more.
Recently, Krebs on Security reported on a financial crime group called the “Disneyland Team” that uses an uncommon phishing technique. This method makes use of a little-known feature built into most web browsers to render domain names with non-Latin characters. Called Punycode, the feature takes a URL that contains special character strings and renders them using non-Latin characters. These are the types of user trust attacks that ConcealBrowse defeats. To identify and block these attacks, ConcealBrowse relies on advanced phishing identification and an intelligence-fed decision engine instead of allowing users to make decisions based on their own trust and ability to spot suspicious sites.
Implementing zero-trust principles across your network and throughout your organization is an expensive and time-consuming process. In fact, recent research shows that while 91% of companies are aware of or want to deploy zero-trust security measures, only 12% are fully deployed. With an increasing amount of work happening in the browser, both on and off your network, you need the best browser security solution to push zero-trust to the edge quickly and affordably. That’s where ConcealBrowse comes in with smart, dynamic remote browser isolation and phishing protection built in.
In this podcast, Nate Fritsch discusses how we now live in a world of APIs and permissionless connectivity.