Crucial Tech Podcast with John Wilson: Hybridized Vishing Attacks | Press Release

Crucial Tech Podcast with John Wilson: Hybridized Vishing Attacks

Posted on September 9, 2022 | Cybersecurity , Data Security

In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson delves into the latest research from Agari and PhishLabs by HelpSystems

John explains how criminals use hybrid vishing techniques to trick people into sharing passwords or bank details and what vulnerabilities they exploit when targeting Microsoft 365 users. 

Originally published in Cyber Protection Magazine

Excerpt 

“Hybrid vishing scams work enormously well according to John Wilson, senior fellow for threat research at Agari, a research division within the cybersecurity company HelpSystems. Wilson reported that this type of scam has increased 550% year on year. Most of that increase happened in the first half of the year.”

Listen to the full podcast here
 

Recent News
September 28, 2022
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
September 22, 2022
Agari, Alert Logic, Digital Defense, Digital Guardian, and Tripwire, all by HelpSystems, were recognized in Expert Insights’ “Best-Of” Awards for Fall 2022.
September 20, 2022
Whether intentional or otherwise, the Insider Threat poses a serious risk to business. HelpSystems’ experts, Bob Erdman, John Grancarich and Tom Huntington highlight the risks in this Digital Journal article and describe the solutions organizations can implement to help prevent malicious actors.
September 20, 2022
Credence Security, a leading regional distributor of specialized solutions in cybersecurity, forensics, governance, risk, and compliance, has signed a distribution agreement with HelpSystems, a cybersecurity and automation software provider, to deliver their expansive portfolio across the UAE and wider GCC region.
September 16, 2022

In his article for Tech Native, John Grancarich simplifies Zero Trust, and provides 7 steps organizations can take to implement a Zero Trust architecture.