home.social

#phishing-protection — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #phishing-protection, aggregated by home.social.

fetched live
  1. Imagine getting an email that perfectly mimics a trusted colleague—almost impossible to spot as a scam. Varonis Interceptor’s multimodal AI is stepping in to catch these next-level phishing tricks. Ready to see how it’s changing the game in email security?

    thedefendopsdiaries.com/how-va

    #emailsecurity
    #artificialintelligence
    #phishingprotection
    #cyberthreats
    #varonisinterceptor

  2. For defending against phishing campaigns, you've got to have sensible security rules in place and a good overall security practice in your organization. You also need to be running EDR tools (EDR/XDR) and edge protection. These practices will all help, though they are not a silver bullet against the problem.

    Be aware as a practitioner if DNS over HTTPS is becoming more present on your network. If you control your own DNS resolver, that's the best way to go.

    DNS is really your friend as a security practitioner.

    Listen to the full episode of the Breaking Badness Cybersecurity Podcast here: domaintools.com/resources/podc

    #DNS #cybersecurity #infosec #infosecurity #phishing #phishingprotection #phishingprevention

  3. In Part 2 of our BEC-ware the Phish blog series, Rachel Rabin dives into the crucial steps for responding to and remediating Business Email Compromise (BEC) incidents in M365. 💻

    We'll delve into the key response actions to contain a live attacker, looking at the complexities of token revocation and password resets in hybrid environments.

    An effective response requires a proactive setup. Implement pre-configured response accounts and automation to take actions consistently and without delay.

    Short-term remediations help get back to business as usual, and our long-term suggestions will protect against future phishing attacks.

    We'll explore hardening measures such as Conditional Access policies, phishing-resistant authentication, token protections, and app consent policies to protect against AiTM and OAuth phishing frameworks.

    Lastly, we'll look at dedicated controls to protect privileged accounts from phishing, such as cloud-only identity for cloud administrative activities.

    Get the full technical breakdown in the latest blog: pentestpartners.com/security-b

    #CyberSecurity #BusinessEmailCompromise #M365Security #PhishingProtection #InfoSec #CloudSecurity #ZeroTrust #TechCommunity

  4. 🔒 Protect Yourself from Phishing! 🚫

    Phishing is a common cyber fraud where attackers try to steal your sensitive information. 🎣 Learn to recognize and prevent phishing attacks with our tips on identifying suspicious emails, verifying links, and safeguarding your data.

    Stay safe online and share this post to help protect your friends too! 🛡️✨

    #CyberSecurity #StaySafeOnline #PhishingProtection #TechTips

  5. A lot of email sent to my employer wouldn't be delivered if we hadn't added allow-list exceptions to our phishing protections, because the sending organisations haven't setup their email correctly. With Google already blocking email which fails SPF and DKIM and due in February to require DMARC for bulk senders this is a ticking time bomb for marketing and communication teams who rely mailing list emails being delivered to customers and supporters. Fix your email people!
    #dmarc #spf #dkim #phishingprotection #emailmarketing rgbartlett.co.uk/your-email-is