• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Surveys
  • Partners
    • Request a Briefing
    • Become a Partner
    • Landing Pages
    • Bookings
      • Advertising Collection Form
      • Approved Interview Form
      • Approved Interview Form – Returning Guest
      • Book a Conference Interview
      • Conference Collection Form
  • Hosts
  • Company
    • About
    • Contact
    • Careers

Articles/ Attack Simulation/ Attack Surface Mgmt/ Blue Team/ Cloud Security/ Compliance/ Email Security/ Exploit Prevention/ Identity and Access/ OSINT/ Privacy/ Security Awareness/ Social Engineering/ Zero Trust

Phishing: The Gift that Keeps on Giving

Matt Alderman November 9, 2020

When we talk about legacy security challenges and solutions, we can’t forget about our old friends email and phishing.  Phishing has been around for over 20 years and is still one of the most effect attack paths to steal credential, exploit endpoints, and deploy malware.  After 20 years, you’d think we could find effective solutions to thwart these attacks.

Email has been around for over 50 years, evolving a set of protocols and standards that make up our current email systems.  However, a number of these protocols and standards are inherently insecure.  As an industry, we’ve attempted to deploy solutions to protect against these flaws.  We’ve tried email filtering, web filtering, attachment scanning, spoofing prevention, and even user awareness training.  Yet, phishing still works.  Will we ever find a solution?

We recently interviewed Kevin O’Brien, CEO and Co-Founder at GreatHorn, on Enterprise Security Weekly to discuss phishing, the latest attacks, and approaches to prevent these attacks.  Kevin shared the details of a massive cyberattack propagating via redirector domains and subsidiary domains.  The challenge with these types of attacks is that traditional email security tools won’t detect them, as the domains are legitimate, but using redirects to propagate them.  The end result of this attack is credential theft, deployed malware, and potentially a future business email compromise.

GreatHorn recommends that security teams immediately search their organizational email for messages containing URLs that match the threat pattern (http://t.****/r/) and remove any matches immediately.  If you don’t have the resources, GreatHorn provides the most comprehensive email security platform, giving organizations the sophisticated email security control required, including the ability to:

  • Detect and block attacks before they reach end users.
  • Reduce attack engagement by warning users during an attack of potential threats.
  • Limit exposure by automating incident response and remediation after an attack.

To get a better overview of the details of this attack, watch the interview on Enterprise Security Weekly here, register for their upcoming webcast, Preventing Phishing Scams in the New Perimeter-less World, or visit securityweekly.com/greathorn for more information.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

abstract-technology-science-concept-brain-digital-link-binary-hi-tech-blue-background_36402-92

Articles /

Selecting the Right Brain for Your Sensors

CT_web_featured_3_20_20

Attack Simulation /

How Can We Vaccinate Our Networks?

immutable infrastructure

Attack Surface Mgmt /

Securing, Monitoring, and Remediating Immutable Infrastructure

‹ Why Network Data Should be the Foundation of Your Security Strategy › Building A Truly Unified Endpoint Data Platform

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS Feed RSS - Posts

Search

Follow Us On Twitter

→ Follow Us
© Security Weekly 2021
Powered by WordPress • Themify WordPress Themes