You've requested...

Share this with your colleagues:

Antigena Email: Spear Phishing & Payload Delivery

If a new window did not open, click here to view this asset.

Download this next:

CW ASEAN: How managed security services help to reduce cyber risk

With the complexity and volume of cyber threats increasing exponentially, organizations are finding it more challenging to keep up with the pace of the cyber security. They are also struggling to hire skilled talent for cyber security teams and facilities due to a chronic shortage of manpower in the market. These have led to growing demand for managed security service providers which have the right capabilities, technological know-how and talent to help make full use of their investments in cyber security. In this month’s issue of CW ASEAN, read more about the pros and cons of using managed security services and considerations you should be aware of.

Also in this issue:

ASEAN countries recognize importance of international cyber collaboration: Even as Southeast Asia works towards coordinating cyber security strategies, more needs to be done to establish cyber norms

How to stay ahead in the cyber arms race: Darktrace’s Asia-Pacific managing director, Sanjay Aurora, tells Aaron Tan what organizations can do to put the odds in their favour when combating cyber threats

How companies can fend off cyber attacks: Organizations should map IT assets to business strategy and adopt a proactive cyber security program, CenturyLink’s chief security officer, Dave Mahon, tells Aaron Tan

These are also closely related to: "Antigena Email: Spear Phishing & Payload Delivery"

  • CW ANZ: On cyber alert

    Achieving any form of computer security is an uphill task, costing Australian companies money, time and effort with no prospect of a reprieve any time soon. In this month’s CW ANZ, read more about the state of cyber security in Australia, Telstra’s efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.

    Also in this issue:

     

    CISOs in Australia and Singapore voice concerns about cloud services security: Unsanctioned cloud applications continue to be major bugbear among security chiefs in Australia and Singapore, a Symantec survey has found.

    How to stay ahead in the cyber arms race: Darktrace’s Asia-Pacific managing director, Sanjay Aurora, tells Aaron Tan what organisations can do to put the odds in their favour when combating cyber threats.

    How companies can fend off cyber attacks: Organisations should map IT assets to business strategy and adopt a proactive cyber security programme, says CenturyLink’s chief security officer, Dave Mahon.

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts for a range of online services. In 2017, these trends are expected to continue as ransomware and IoT botnet malware evolve to become even more sophisticated, but there is also an increase in professional, advanced attacks – including attacks on cloud infrastructure – and the rise of data manipulation attacks, further underlining the need for a fresh approach to data security. Cyber security education and training is more important than ever to enable organisations to truly understand the risks and vulnerabilities, and then look for the most effect way to manage and mitigate them, which may include new security technologies such as behavioural analytics and artificial intelligence to tip the balance in favour of the cyber defenders.

Find more content like what you just read:

  • Breaking the ransomware chain: 4-step protection

    Deployment of ransomware is not an instantaneous process. Instead, it is an indication that the network has been compromised through a series of events. IronNet’s NDR capabilities are designed to be an essential component of your layered security strategy for preventing ransomware attack by early detection. Read on to learn more in the whitepaper.

    Download

  • 2020 Cyberthreat Intelligence Report

    Download this Infoblox Cyberthreat Intelligence Report to unlock extensive research and expert insight into the most prominent cyberthreats and security trends of Q4 2020 as well as projected trends for 2021.

    Download

  • Don’t be one of those MSPs: Stop phishing attacks before they happen

    As recent, high-profile attacks have highlighted, ransomware (often perpetrated via phishing) is a huge risk for MSPs worldwide. Access this INKY white paper to learn how phishing attacks play out, explore strategies you can use to fight them, and discover how INKY’s mathematical and behavioral models stop ransomware attacks before they happen.

    Download

  • The rise of ransomware: How to manage the 3 key attack vectors

    Although the sophistication of today’s multistage ransomware campaigns presents challenges to many organizations, it can also be used against cyber criminals. With this white paper, find a recommended approach to reducing ransomware risk. Read on to learn more.

    Download

  • Email security: Never more important

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

    Download

  • Email security: Never more important

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

    Download

  • Malware Threat Report 2021

    Threat actors are shifting to Malware-as-a-Service (MaaS) models with specialists emerging in different areas as enterprises simultaneously adopt SaaS. As a means of combating today’s threat landscape, BeyondTrust offers its 2021 malware threat report including key findings & insights. Download the comprehensive report to get started.

    Download

  • Threat Intelligence Report: 2020 Threat Landscape

    Which attacks avoided traditional security last year? Read this report from VMware to get a summary of key data and findings observing millions of networks/network segments from July 2020 to December 2020. It highlights threats that evaded perimeter defenses and were identified by VMware sensors placed inside the perimeter.

    Download

  • Ransom mafia: Analysis of the world’s first ransomware cartel

    Analyst1 produced a report to better understand and defend against advanced ransomware attackers, like Twisted Spider, Viking Spider, Lockbit Gang, etc. Download the report to uncover their findings.

    Download

  • Ransomware Threat Report

    Ransomware attacks grew dramatically in 2020 – in fact, the average ransom paid rose by nearly $200,000 (or 171%). This Ransomware Threat Report dives deeper into the top ransomware observations and variants in 2020 to provide you with strategic recommendations for fighting the ransomware threat landscape in 2021.

    Download

  • 2021 Unit 42 Ransomware Threat Report

    For cybercriminals ransomware has become a goldmine – with the average ransom paid by organizations in the US, Canada and Europe rising by 171% since 2019. Access this ransomware threat report to explore ransomware trends and variants observed in 2020 and unlock strategic recommendations for 2021.

    Download

  • How Acronis is stopping fileless attacks that traditional solutions can’t

    Access this white paper to learn everything you need to know about fileless attacks including their 3 stages, and discover how Acronis Cyber Protect can detect and stop fileless malware with its multilayered approach to threat response.

    Download

  • 2021 Endpoints threats trends – Cybersecurity threat trends: phishing, crypto top the list

    In this report, discover how using Cisco Umbrella captured billions of queries, identifying the top cyber threats in 2020, and how to stop them in the future.

    Download

  • Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • Email security: How platform integration improves strategy

    Access this white paper from Gartner to learn how to build a pervasive email security strategy through platform integration. This guide contains sections on platform integration, using AI for phishing defense, cloud strategy, market research, and more.

    Download

  • How healthcare organizations can respond to ransomware

    The revolution in medical devices, software, and mobile technology is making it possible to deliver more efficient and effective patient care. But these technologies have generated new opportunities for cyberattackers. In this e-book, learn how to gain the visibility, control and protection you need to secure your users and data.

    Download

  • Ransomware: how to protect yourself

    The staggering emergence of ransomware groups following the successful RaaS and double extortion models has made ransomware one of the biggest threats in recent years. In this whitepaper, learn how eSentire addresses 6 key ransomware challenges and how they can help protect your business.

    Download

  • 2020 cyber threat landscape report

    Cyber threats assumed the spotlight in 2020, but which ones shined the brightest? Download Deep Instinct’s 2020 Cyber Threat Landscape report to examine the top 5 malware, ransomware and banking trojan families, malware trends by OS and campaign and some of the most serious past and future cyber risks.

    Download

  • CW APAC – July 2021: Trend Watch: Supply Chain Security

    In this handbook, Computer Weekly looks at rise of supply chain attacks, the challenges that come with zero-trust security and attacks on the Covid-19 vaccine supply chain

    Download

  • 2021 mid-year threat landscape

    Which tactics did bad actors leverage most in the first half of 2021? What do the results say about what they’ll do in the second half? Download Deep Instinct’s 2021 Mid-Year Threat Landscape Report to uncover the biggest trends in malware, ransomware and banking trojans from H1 2021.

    Download

  • Explaining your cybersecurity needs to a room of execs

    For security leaders, one of the most daunting tasks is explaining your organization’s cybersecurity strategy and needs to a nontechnical audience – especially when that audiences consists of executives and the board of directors. Read this e-guide to learn about which key metrics to highlight and how to make your case to a room of execs.

    Download

  • How to integrate AI & machine learning with your cybersecurity strategy

    As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.

    Download

  • Maturing Your DLP Strategy for Today’s Threats

    Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.

    Download

  • Six Email Security Best Practices for Email SaaS

    This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.

    Download

  • APAC guide to plugging endpoint security gaps

    In this e-guide, read more about the evolution of endpoint security, how APAC organisations are using artificial intelligence to plug endpoint security gaps as well as potential blindspots in encrypted traffic used by a growing plethora of endpoint devices.

    Download

  • 2021 State of the Phish report

    Phishing proved to be one of the most prominent threats of 2020 – luckily, most organizations have taken measures towards addressing this threat in 2021 in the form of phishing tests and security awareness training. Read this State of the Phish report for a comprehensive look into phishing observations, insights and recommendations.

    Download

  • BlackBerry 2021 Threat Report

    The BlackBerry 2021 Threat Report examines and analyzes the biggest cybersecurity events of the current and past year. This edition covers COVID-19 exploitation, election vulnerabilities, top malware attacks, and many other contemporary issues. Download it now.

    Download

  • Events and Issues impacting cybersecurity in 2021

    Access this BlackBerry 2021 Threat Report to examine the biggest cybersecurity events of last year and the security issues likely to affect the upcoming year.

    Download

  • TA551/Shathak threat actor research

    TA551/Shathak is a sophisticated cybercrime actor targeting end users on a global scale. The group has distributed different malware families over time, but has consistently used password-protected ZIP archives containing macro-enabled Office documents. Download this e-book for a technical deep dive and an analysis of this threat.

    Download

  • Email Security Best Practices for Email Security as a Service

    In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.

    Download

  • BEC & EAC: Who’s behind the mask?

    The FBI has recognized business email compromise (BEC) and email account compromise (EAC) as one of the most pervasive and costliest cyberthreats in circulation. In fact, the average attack nets the attacker nearly $130,000. To learn more about BEC and EAC and how to prevent it, read this e-book.

    Download

  • How to detect and respond to security incidents

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

    Download

  • The hidden costs of free

    As organizations opt for third-party email platforms, like Microsoft 365, it becomes increasingly critical that they ensure security is up to snuff. Unfortunately, Microsoft 365’s native security features may not be best-fit for every user. Read this e-guide to learn more about how to make the most out of Microsoft 365.

    Download

  • Secure your Microsoft 365 email

    If your organization uses Microsoft 365 email, is it sufficiently prepared to handle advanced email threats and attacks? Dive into this white paper to explore the security challenges facing companies that rely on Microsoft 365 for email and learn recommendations for mitigating these risks.

    Download

  • INKY vs. Microsoft Defender for Office 365

    This solution brief pits INKY against Microsoft’s Defender for Office 365 (MSDO) – exploring the similarities and differences between the offerings and highlighting a few key examples of phishing scams INKY caught, but MSDO didn’t – read on to get started.

    Download

  • Spear-phishing: Top threats & trends Vol. 5

    As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.

    Download

  • eGuide: Expert Tips for Deploying Secure Messaging Technologies

    This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.

    Download

  • 10 tactics for fending off advanced cyber threats

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

    Download

  • 34 phishing scams by region

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

    Download

  • 8 strategies that prevent spear phishing attacks

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

    Download

  • A Computer Weekly buyer's guide to artificial intelligence in IT security

    Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.

    Download

  • A Computer Weekly buyer's guide to artificial intelligence in IT security

    Artificial intelligence is keeping businesses ahead when it comes to fighting cyber crime. In this 14-page buyer's guide, Computer Weekly looks at how IT security is automating its systems, the tools letting firms achieve more with less and the advantages of predictive security.

    Download

  • The top 5 challenges managed security addresses

    Today’s cyberthreats are becoming harder and harder to solve as the cybersecurity skills gap grows. In fact, it’s expected that there will be around 3.5 million unfilled cybersecurity jobs by the end of the year – so, what does this mean for security operations? Read this e-book to find out how managed security services can help bridge the gap.

    Download

  • A blueprint for modern layered cybersecurity

    The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.

    Download

  • 2021 cyber threat landscape report

    In the past year, new challenges have arisen due to the shift to remote – now hybrid – working models and increased third-party service adoption. This 2021 Technology Industry Cyber Threat Landscape Report gathers the latest information on threats to tech and the valuable data traversing its systems.

    Download

  • What every organization needs to know before, during, and after an attack

    Ransomware is an old threat that persists as a modern-day problem, but most companies are ill-prepared for a ransomware attack. Download this guide to find out what you can do before, during, and after a ransomware attack to protect your organization.

    Download