Proofpoint researchers have increasingly observed that threat actors leverage natural human curiosity rather than exploits to trick users into opening malicious emails, clicking on links, transferring funds, and more. While document-based exploits and exploit kits still regularly threaten individuals and organizations, decreasing technical vulnerabilities makes people far more attractive and reliable targets.
From business email fraud schemes to macro-laden documents to malicious links in social media spam, attackers are making the most of the human factor. We see evidence of this every day in large scale campaigns targeting millions of recipients, smaller personalized campaigns, and highly targeted attacks on individuals with access to sensitive information and banking credentials.
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities