The Latest Barracuda News
Product and Solution Information, Press Releases, Announcements
Email threat types: URL phishing
These attacks are successful when a victim follows a link to a website and provides whatever information is requested. Normally these links are disguised as password resets or identity confirmations for legitimate services. The website is also disguised so that the victim does not notice that it is a fake website.
EMOTET takedown brings encouraging news
This takedown of EMOTET was carried out under a European Multidisciplinary Platform Against Criminal Threats (EMPACT) framework set up in 2010 for EUROPOL by the member states of the European Union (EU). That framework has been used to arrest criminal gangs operating across borders, but success against cybercriminals has often proved to be more elusive.
Passwords are the root of all phishing evil
Nearly a third (29%) said they also experienced a credential stuffing attack where it was clear cybercriminals were attempting to employ a large number of stolen user identification names and passwords to compromise applications and systems.
New research reveals IT professionals’ growing confidence in public cloud despite security concerns
CAMPBELL, Calif., January 14, 2021 —
The top five security threats to watch in 2021
On the plus side, there is light at the end of the tunnel, and IT security teams should be better resourced and more capable of supporting the business during this crucial year. But cyber-criminals won’t make life easy. Here’s what to look out for in 2021.
Latest breaches highlight integration insecurity
Exploits of software supply chains have led to a series of incidents that illustrate all too clearly how dependencies that exist between multiple services can have a devastating downstream impact that can all be traced back to a single breach.
Zero Trust Security begins and ends with identity
A recent survey of 623 IT security leaders and 586 business decision-makers from the U.S conducted by The Ponemon Institute on behalf of Code42, a provider of a platform for detecting data loss, notes 59% of respondents expect insider threats will increase in the next two years primarily because users have access to files they shouldn’t, employees’ preference to work the way they want regardless of security protocols, and the continuing need to work from home.
Phishing attacks spike just before the holidays: Are you prepared?
In Volume 1 of Spear Phishing: Top Threats and Trends, Barracuda researchers looked at the number of attacks before, during, and after the holidays. They saw a spike in attacks in the days leading up to the holiday, and then a significant drop off during the actual holidays when many workers are out of the office.
MountLocker ransomware illustrates how attacks are evolving
Cybercriminals are combining MountLocker, which is less than 100Kb in size, with malware such as AdFind to perform network reconnaissance and CobaltStrike Beacon to spread that malware laterally once it is installed.
It’s never been more important to backup Office 365
The Office 365 platform has so many applications that many workers can perform most of their work entirely within this suite. IT teams like the platform because it's easy to adopt and deploy, and Microsoft is responsible for keeping the online applications updated. With that said, you still need to do some things to protect your data.