Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2024-08-30 12:42:42 |
Comparaison des points de preuve et une sécurité anormale: le fabricant de nourriture n'en comprend qu'une seule dans leur recette de succès Comparing Proofpoint and Abnormal Security: Food Manufacturer Includes Only One in their Recipe for Success (lien direct) |
As modern global supply chains expand, food processors, manufacturers and agriculture service providers are faced with an impossible security task. Not only are they responsible for feeding families worldwide, but they must also be hyper-vigilant about cyber threats that increasingly target them. And they must do all this despite shrinking budgets and higher constraints on their resources.
For these reasons, the success of their security strategy often depends on their ability to:
Continuously detect threats that target their people
Ease the growing burden on their IT teams
Decrease their reliance on ineffective native security tools
We learned this from one of our customers in the food manufacturing industry who recently compared Proofpoint Threat Protection to Abnormal Security\'s point product. We have anonymized their story in order to share their experiences and lessons learned. The following blog offers insights into how the food industry can build a better people-centric defense.
A slow descent into message madness
Spurred by progressively deceptive attacks from threat actors, the manufacturer had seen a gradual decline in the threat efficacy of its email security built on Microsoft. Microsoft\'s native security has historically struggled against the types of advanced email attacks the customer observed.
The security team saw an influx of employee-reported malicious messages which primarily used impersonation and social engineering techniques. These attacks included:
Invoicing fraud and CEO spoofing through business email compromise (BEC)
Malware from compromised supplier accounts
Telephone-oriented attack delivery (TOAD)
The backlog in their abuse mailbox that contained user-reported emails grew by the day. The team needed to manually investigate and remediate each of these threats while trying to control the inflow of new ones. This put their already stretched thin security team under unsustainable pressure. The company worried about jeopardizing their place in the international food chain and their mission to feed communities.
After a near miss with an email containing ransomware, the manufacturer decided it was time for a change. Enter Proofpoint and Abnormal Security.
Comparing Proofpoint and Abnormal side-by-side
The food manufacturer ran concurrent evaluations with Proofpoint and Abnormal Security to find the best solution to protect their more than 7,000 employees, countless customers, suppliers and third-party partners. This comparison process revealed the differences between the two offerings.
Each company has a different approach. Proofpoint provides a comprehensive platform. It detects threats continuously to protect people throughout the entire email delivery life cycle. In contrast, Abnormal focuses on limited post-delivery detection and remediation.
The team began its selection process with very clear decision criteria. It was determined to find the right partner to augment the company\'s native Microsoft email security and defend its 100-year-old heritage brand. Below are the key areas where the customer compared Proofpoint and Abnormal.
End-to-end detection capabilities-Proofpoint wins
Abnormal\'s restrictive structure only allows malicious messages to be detected after they are delivered to a user\'s inbox. It has a 0% pre-delivery efficacy rate, meaning all email attacks must be retracted from users\' inboxes. This puts users at undue risk. Proofpoint threat research found that 1-in-7 clicks on malicious links occur within 60 seconds of a message\'s delivery. And one-third of replies to BEC messages happen in less than five minutes.
Proofpoint Threat Research results.
The customer recalled that Abnormal relies too heavily on behavioral AI and lacks sandboxing capabilities. They shared concerns that this would expose their company to never-before-seen links and attachments. &nbs |
Ransomware
Spam
Malware
Tool
Threat
|
Heritage
|
★★
|
 |
2024-07-13 10:30:00 |
Les utilisateurs de logiciels espions exposés dans une violation de données majeure Spyware Users Exposed in Major Data Breach (lien direct) |
Plus: la Heritage Foundation est piratée sur Project 2025, un fournisseur de logiciels de concessionnaires automobiles semble avoir payé 25 millions de dollars à un gang de ransomware et les autorités perturbent une ferme de robots russes.
Plus: The Heritage Foundation gets hacked over Project 2025, a car dealership software provider seems to have paid $25 million to a ransomware gang, and authorities disrupt a Russian bot farm. |
Ransomware
Data Breach
|
Heritage
|
★★★
|
 |
2023-02-13 15:27:37 |
13th February – Threat Intelligence Report (lien direct) |
>For the latest discoveries in cyber research for the week of 13th February, please download our Threat_Intelligence Bulletin TOP ATTACKS AND BREACHES The California cities of Oakland and Modesto have been targeted by ransomware attacks, disrupting services in the former and the police network in the latter. Also in California, healthcare company 'Heritage Provider Network' […]
|
Ransomware
Threat
|
Heritage
|
★★
|
 |
2023-02-10 19:45:08 |
December ransomware attack leads to massive data breach from California health network (lien direct) |
Facilities within California's Heritage Provider Network reported a data breach related to a ransomware attack in December |
Ransomware
Data Breach
Guideline
|
Heritage
Heritage
|
★★★
|
 |
2023-02-10 12:36:22 |
California medical group data breach impacts 3.3 million patients (lien direct) |
Multiple medical groups in the Heritage Provider Network in California have suffered a ransomware attack, exposing sensitive patient information to cybercriminals. [...] |
Ransomware
Data Breach
Medical
|
Heritage
Heritage
|
★★★
|
 |
2020-01-10 10:01:19 |
300 without jobs because Company shuts down of ransomware (lien direct) |
An Arkansas-based telemarketing firm sent home more than 300 employees and told them to find new jobs after IT recovery efforts didn’t go according to plan following a ransomware incident that took place at the start of October 2019. Employees of Sherwood-based telemarketing firm The Heritage Company were notified of the decision just days before […]
|
Ransomware
|
Heritage
|
|
 |
2020-01-06 12:10:44 |
Company Told Employees to Seek Other Work After Ransomware Attack (lien direct) |
A marketing agency told its employees that they were free to seek other employment after suffering a ransomware infection. On January 2nd, the Heritage Company released a statement in which it explained that it had made some progress in its recovery efforts following a ransomware attack. The company qualified this statement, however, by stating that […]… Read More
|
Ransomware
|
Heritage
|
|
 |
2019-12-24 12:09:29 |
Marketing Agency Temporarily Halts Operations after Ransomware Attack (lien direct) |
A marketing agency announced just days before Christmas that it would be temporarily suspending operations as it works to recover from a ransomware attack. Sandra Franecke, CEO of the Heritage Company, sent a letter to employees that the company would temporarily be suspending its operations. She went on to ask the agency’s more than 300 […]… Read More
|
Ransomware
|
Heritage
|
|