Source |
Network World |
Identifiant |
354132 |
Date de publication |
2017-04-06 05:10:00 (vue: 2017-04-06 05:10:00) |
Titre |
What enterprises can learn in the aftermath of a phishing attack |
Texte |
The problem: spearphishingImage by John Singleton Copley/National Gallery of ArtSpearphishing is a top attack vector used by cyber adversaries today. Consists of fraudulent emails that appear to be legitimate which target specific organizations, groups, or individuals to gain access to information systems. Targeted spear phishing also leverages social engineering which includes research about specific targets of interest. Organizations rely on email connectivity with the outside to function and thus is an entry into a potential target's environment that bypasses many of the legacy security stack.To read this article in full or to leave a comment, please click here |
Envoyé |
Oui |
Condensat |
about access adversaries aftermath also appear article artspearphishing attack bypasses can click comment connectivity consists copley/national cyber email emails engineering enterprises entry environment fraudulent full function gain gallery groups here includes individuals information interest john learn leave legacy legitimate leverages many organizations outside phishing please potential problem: read rely research security singleton social spear spearphishingimage specific stack systems target targeted targets thus today top used vector what which |
Tags |
|
Stories |
|
Notes |
|
Move |
|