home.social

#businessemailcompromise — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #businessemailcompromise, aggregated by home.social.

  1. KI-Betrug: Interpol warnt vor industrialisierter Finanzkriminalität – 4,5-fach profitabler

    Sogenannte „agentische KI“-Systeme sind mittlerweile in der Lage, vollständige Betrugskampagnen eigenständig zu planen und durchzuführen – von der Informationsbeschaffung über die Kontaktaufnahme mit Opfern bis hin zu Zahlungsaufforderungen.

    all-about-security.de/ki-betru

    #interpol #agentischeKI #BEC #BusinessEmailCompromise #QRCode

  2. Law Firms Are Now Prime Targets for Cybercrime – Are You Ready?

    Legal practices across the UK are facing an unprecedented surge in cyber attacks.

    Why? Because firms hold exactly what cybercriminals want:

    ✅ Confidential client data
    ✅ High-value financial transactions
    ✅ Systems not built for modern threats

    The result? Law firms now rank among the most targeted professional service sectors.

    In my latest article, I break down why legal firms are in the crosshairs, the attack techniques most commonly used, the unique challenges legal practices face (like protecting professional privilege) - And - most importantly - what firms can do to stay secure, resilient, and compliant.

    This isn’t theory. These are practical, real-world security steps for law firms that handle sensitive data, tight deadlines, and complex regulations.

    📚 If you’re a solicitor, partner, or law firm IT lead, this guide is for you.

    👉 Read the full article here: paulreynolds.uk/cybersecurity-

    🛡️ Want help building a defensible cybersecurity position tailored for legal practice? DM or connect - we make cyber risk manageable, even if your firm doesn’t have a CISO.

    #CyberSecurity #LegalTech #LawFirmSecurity #SRA #GDPR #CyberRisk #ProfessionalServices #BusinessEmailCompromise #Ransomware #DataProtection #PaulReynolds #YourDigitalCTO

  3. Law Firms Are Now Prime Targets for Cybercrime – Are You Ready?

    Legal practices across the UK are facing an unprecedented surge in cyber attacks.

    Why? Because firms hold exactly what cybercriminals want:

    ✅ Confidential client data
    ✅ High-value financial transactions
    ✅ Systems not built for modern threats

    The result? Law firms now rank among the most targeted professional service sectors.

    In my latest article, I break down why legal firms are in the crosshairs, the attack techniques most commonly used, the unique challenges legal practices face (like protecting professional privilege) - And - most importantly - what firms can do to stay secure, resilient, and compliant.

    This isn’t theory. These are practical, real-world security steps for law firms that handle sensitive data, tight deadlines, and complex regulations.

    📚 If you’re a solicitor, partner, or law firm IT lead, this guide is for you.

    👉 Read the full article here: paulreynolds.uk/cybersecurity-

    🛡️ Want help building a defensible cybersecurity position tailored for legal practice? DM or connect - we make cyber risk manageable, even if your firm doesn’t have a CISO.

    #CyberSecurity #LegalTech #LawFirmSecurity #SRA #GDPR #CyberRisk #ProfessionalServices #BusinessEmailCompromise #Ransomware #DataProtection #PaulReynolds #YourDigitalCTO

  4. Law Firms Are Now Prime Targets for Cybercrime – Are You Ready?

    Legal practices across the UK are facing an unprecedented surge in cyber attacks.

    Why? Because firms hold exactly what cybercriminals want:

    ✅ Confidential client data
    ✅ High-value financial transactions
    ✅ Systems not built for modern threats

    The result? Law firms now rank among the most targeted professional service sectors.

    In my latest article, I break down why legal firms are in the crosshairs, the attack techniques most commonly used, the unique challenges legal practices face (like protecting professional privilege) - And - most importantly - what firms can do to stay secure, resilient, and compliant.

    This isn’t theory. These are practical, real-world security steps for law firms that handle sensitive data, tight deadlines, and complex regulations.

    📚 If you’re a solicitor, partner, or law firm IT lead, this guide is for you.

    👉 Read the full article here: paulreynolds.uk/cybersecurity-

    🛡️ Want help building a defensible cybersecurity position tailored for legal practice? DM or connect - we make cyber risk manageable, even if your firm doesn’t have a CISO.

    #CyberSecurity #LegalTech #LawFirmSecurity #SRA #GDPR #CyberRisk #ProfessionalServices #BusinessEmailCompromise #Ransomware #DataProtection #PaulReynolds #YourDigitalCTO

  5. Law Firms Are Now Prime Targets for Cybercrime – Are You Ready?

    Legal practices across the UK are facing an unprecedented surge in cyber attacks.

    Why? Because firms hold exactly what cybercriminals want:

    ✅ Confidential client data
    ✅ High-value financial transactions
    ✅ Systems not built for modern threats

    The result? Law firms now rank among the most targeted professional service sectors.

    In my latest article, I break down why legal firms are in the crosshairs, the attack techniques most commonly used, the unique challenges legal practices face (like protecting professional privilege) - And - most importantly - what firms can do to stay secure, resilient, and compliant.

    This isn’t theory. These are practical, real-world security steps for law firms that handle sensitive data, tight deadlines, and complex regulations.

    📚 If you’re a solicitor, partner, or law firm IT lead, this guide is for you.

    👉 Read the full article here: paulreynolds.uk/cybersecurity-

    🛡️ Want help building a defensible cybersecurity position tailored for legal practice? DM or connect - we make cyber risk manageable, even if your firm doesn’t have a CISO.

    #CyberSecurity #LegalTech #LawFirmSecurity #SRA #GDPR #CyberRisk #ProfessionalServices #BusinessEmailCompromise #Ransomware #DataProtection #PaulReynolds #YourDigitalCTO

  6. Law Firms Are Now Prime Targets for Cybercrime – Are You Ready?

    Legal practices across the UK are facing an unprecedented surge in cyber attacks.

    Why? Because firms hold exactly what cybercriminals want:

    ✅ Confidential client data
    ✅ High-value financial transactions
    ✅ Systems not built for modern threats

    The result? Law firms now rank among the most targeted professional service sectors.

    In my latest article, I break down why legal firms are in the crosshairs, the attack techniques most commonly used, the unique challenges legal practices face (like protecting professional privilege) - And - most importantly - what firms can do to stay secure, resilient, and compliant.

    This isn’t theory. These are practical, real-world security steps for law firms that handle sensitive data, tight deadlines, and complex regulations.

    📚 If you’re a solicitor, partner, or law firm IT lead, this guide is for you.

    👉 Read the full article here: paulreynolds.uk/cybersecurity-

    🛡️ Want help building a defensible cybersecurity position tailored for legal practice? DM or connect - we make cyber risk manageable, even if your firm doesn’t have a CISO.

    #CyberSecurity #LegalTech #LawFirmSecurity #SRA #GDPR #CyberRisk #ProfessionalServices #BusinessEmailCompromise #Ransomware #DataProtection #PaulReynolds #YourDigitalCTO

  7. AI is fueling the next wave of #cybercrime! #Phishing attacks, fake invoices, and #BusinessEmailCompromise are now harder to spot. Watch our 8-minute video to learn about new attack tactics and defense tips. youtu.be/1ewEnPVzg2M

    #AIThreats #IT #GenerativeAI #AI #cyberaware

  8. In Part 2 of our BEC-ware the Phish blog series, Rachel Rabin dives into the crucial steps for responding to and remediating Business Email Compromise (BEC) incidents in M365. 💻

    We'll delve into the key response actions to contain a live attacker, looking at the complexities of token revocation and password resets in hybrid environments.

    An effective response requires a proactive setup. Implement pre-configured response accounts and automation to take actions consistently and without delay.

    Short-term remediations help get back to business as usual, and our long-term suggestions will protect against future phishing attacks.

    We'll explore hardening measures such as Conditional Access policies, phishing-resistant authentication, token protections, and app consent policies to protect against AiTM and OAuth phishing frameworks.

    Lastly, we'll look at dedicated controls to protect privileged accounts from phishing, such as cloud-only identity for cloud administrative activities.

    Get the full technical breakdown in the latest blog: pentestpartners.com/security-b

    #CyberSecurity #BusinessEmailCompromise #M365Security #PhishingProtection #InfoSec #CloudSecurity #ZeroTrust #TechCommunity

  9. Defending Against Business Email Compromise (BEC) 📧🔒

    BEC is one of today’s most dangerous threats, bypassing traditional defenses with targeted attacks. Crowdalert combines automation with human insight, engaging your team to verify unusual behavior and escalating real threats fast.

    Ready for the next BEC attempt? Discover how Crowdalert can help. crowdalert.com

    #BEC #BusinessEmailCompromise #Cybersecurity #Crowdalert #EmailSecurity

  10. Defending Against Business Email Compromise (BEC) 📧🔒

    BEC is one of today’s most dangerous threats, bypassing traditional defenses with targeted attacks. Crowdalert combines automation with human insight, engaging your team to verify unusual behavior and escalating real threats fast.

    Ready for the next BEC attempt? Discover how Crowdalert can help. crowdalert.com

    #BEC #BusinessEmailCompromise #Cybersecurity #Crowdalert #EmailSecurity

  11. Defending Against Business Email Compromise (BEC) 📧🔒

    BEC is one of today’s most dangerous threats, bypassing traditional defenses with targeted attacks. Crowdalert combines automation with human insight, engaging your team to verify unusual behavior and escalating real threats fast.

    Ready for the next BEC attempt? Discover how Crowdalert can help. crowdalert.com

    #BEC #BusinessEmailCompromise #Cybersecurity #Crowdalert #EmailSecurity

  12. Defending Against Business Email Compromise (BEC) 📧🔒

    BEC is one of today’s most dangerous threats, bypassing traditional defenses with targeted attacks. Crowdalert combines automation with human insight, engaging your team to verify unusual behavior and escalating real threats fast.

    Ready for the next BEC attempt? Discover how Crowdalert can help. crowdalert.com

    #BEC #BusinessEmailCompromise #Cybersecurity #Crowdalert #EmailSecurity

  13. Defending Against Business Email Compromise (BEC) 📧🔒

    BEC is one of today’s most dangerous threats, bypassing traditional defenses with targeted attacks. Crowdalert combines automation with human insight, engaging your team to verify unusual behavior and escalating real threats fast.

    Ready for the next BEC attempt? Discover how Crowdalert can help. crowdalert.com

    #BEC #BusinessEmailCompromise #Cybersecurity #Crowdalert #EmailSecurity

  14. In this short clip from my appearance on Counsel Cast Podcast, I discuss the two most prevalent cybersecurity risks for law firms—phishing and business email compromise. Protect your practice from these common threats by staying informed and proactive! 🖥️🚨

    Watch the full episode here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #Phishing #BusinessEmailCompromise #LawFirmSecurity #DigitalThreats #PrivacyMatters #FamilyLaw #LegalTech #JonathanSteele #LawFirm

  15. In this short clip from my appearance on Counsel Cast Podcast, I discuss the two most prevalent cybersecurity risks for law firms—phishing and business email compromise. Protect your practice from these common threats by staying informed and proactive! 🖥️🚨

    Watch the full episode here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #Phishing #BusinessEmailCompromise #LawFirmSecurity #DigitalThreats #PrivacyMatters #FamilyLaw #LegalTech #JonathanSteele #LawFirm

  16. In this short clip from my appearance on Counsel Cast Podcast, I discuss the two most prevalent cybersecurity risks for law firms—phishing and business email compromise. Protect your practice from these common threats by staying informed and proactive! 🖥️🚨

    Watch the full episode here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #Phishing #BusinessEmailCompromise #LawFirmSecurity #DigitalThreats #PrivacyMatters #FamilyLaw #LegalTech #JonathanSteele #LawFirm

  17. In this short clip from my appearance on Counsel Cast Podcast, I discuss the two most prevalent cybersecurity risks for law firms—phishing and business email compromise. Protect your practice from these common threats by staying informed and proactive! 🖥️🚨

    Watch the full episode here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #Phishing #BusinessEmailCompromise #LawFirmSecurity #DigitalThreats #PrivacyMatters #FamilyLaw #LegalTech #JonathanSteele #LawFirm

  18. In this short clip from my appearance on Counsel Cast Podcast, I discuss the two most prevalent cybersecurity risks for law firms—phishing and business email compromise. Protect your practice from these common threats by staying informed and proactive! 🖥️🚨

    Watch the full episode here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #Phishing #BusinessEmailCompromise #LawFirmSecurity #DigitalThreats #PrivacyMatters #FamilyLaw #LegalTech #JonathanSteele #LawFirm

  19. In this short clip from my appearance on Counsel Cast Podcast, I discuss the two most prevalent cybersecurity risks for law firms—phishing and business email compromise. Protect your practice from these common threats by staying informed and proactive! 🖥️🚨

    Watch the full episode here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #Phishing #BusinessEmailCompromise #LawFirmSecurity #DigitalThreats #PrivacyMatters #FamilyLaw #LegalTech #JonathanSteele #LawFirm

  20. In my latest appearance on Counsel Cast Podcast, I dive into a critical topic: How Can Your Law Firm Stay Ahead of Digital Hackers? 🖥️🔐 We discuss everything from phishing attempts to business email compromise, and I share actionable tips to protect your law firm from becoming a target. Don't wait until it’s too late—get proactive about your firm's cybersecurity today!

    Listen now for key insights and takeaways that every law firm should be thinking about.

    🎧 Tune in here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #LawFirm #DigitalPrivacy #PhishingProtection #BusinessEmailCompromise #LegalTalk #CyberThreats #DataProtection #FamilyLaw #ChicagoLawyer #JonathanSteele #CyberAware #DigitalDefense #PrivacyMatters #LawFirmSecurity

  21. In my latest appearance on Counsel Cast Podcast, I dive into a critical topic: How Can Your Law Firm Stay Ahead of Digital Hackers? 🖥️🔐 We discuss everything from phishing attempts to business email compromise, and I share actionable tips to protect your law firm from becoming a target. Don't wait until it’s too late—get proactive about your firm's cybersecurity today!

    Listen now for key insights and takeaways that every law firm should be thinking about.

    🎧 Tune in here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #LawFirm #DigitalPrivacy #PhishingProtection #BusinessEmailCompromise #LegalTalk #CyberThreats #DataProtection #FamilyLaw #ChicagoLawyer #JonathanSteele #CyberAware #DigitalDefense #PrivacyMatters #LawFirmSecurity

  22. In my latest appearance on Counsel Cast Podcast, I dive into a critical topic: How Can Your Law Firm Stay Ahead of Digital Hackers? 🖥️🔐 We discuss everything from phishing attempts to business email compromise, and I share actionable tips to protect your law firm from becoming a target. Don't wait until it’s too late—get proactive about your firm's cybersecurity today!

    Listen now for key insights and takeaways that every law firm should be thinking about.

    🎧 Tune in here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #LawFirm #DigitalPrivacy #PhishingProtection #BusinessEmailCompromise #LegalTalk #CyberThreats #DataProtection #FamilyLaw #ChicagoLawyer #JonathanSteele #CyberAware #DigitalDefense #PrivacyMatters #LawFirmSecurity

  23. In my latest appearance on Counsel Cast Podcast, I dive into a critical topic: How Can Your Law Firm Stay Ahead of Digital Hackers? 🖥️🔐 We discuss everything from phishing attempts to business email compromise, and I share actionable tips to protect your law firm from becoming a target. Don't wait until it’s too late—get proactive about your firm's cybersecurity today!

    Listen now for key insights and takeaways that every law firm should be thinking about.

    🎧 Tune in here: youtube.com/watch?v=8splSgkbpK

    #Cybersecurity #LawFirm #DigitalPrivacy #PhishingProtection #BusinessEmailCompromise #LegalTalk #CyberThreats #DataProtection #FamilyLaw #ChicagoLawyer #JonathanSteele #CyberAware #DigitalDefense #PrivacyMatters #LawFirmSecurity

  24. With a rise in Adversary in the Middle (AiTM) phishing, we've seen attackers leverage trusted compromised accounts to launch multi-stage attacks and follow-on BEC activity. Too often, investigations end with "If only this data had been available!"

    We are kicking off our 3-part series on handling Business Email Compromise (BEC) incidents in Microsoft 365! 📧 In Part 1, Rachel dives into the key artefacts for investigating a BEC in M365 and where to find them.

    👉 pentestpartners.com/security-b

    This includes:

    Why enabling Unified Audit Logging is essential for tracking attackers.

    How to use Purview Content Search to analyse compromised mailboxes.

    Pro tips for using Defender's Advanced Hunting to quickly scope the scale of an attack.

    Stay tuned for more actionable insights in Parts 2 & 3!

    #CyberSecurity #BusinessEmailCompromise #M365 #IncidentResponse
    #MicrosoftDefender #EmailSecurity #DigitalForensics #DataRetention #ThreatHunting #CloudForensics