ZDNet: Scammers Are Using This Sneaky Trick to Bypass Spam Filters | Press Release

ZDNet: Scammers Are Using This Sneaky Trick to Bypass Spam Filters

...and trick you into handling over bank details and passwords

Posted on August 19, 2022 | Cybersecurity , Data Security

Hybrid vishing (email-initiated voice phishing) attacks are on the rise. In this ZDNet article, John Wilson discusses the findings from the latest Agari and PhishLabs research and explains what organizations can do to help prevent hybrid vishing attacks.

Originally published in ZDNet.com 

Excerpt: 

"These emails are particularly adept at getting past attack controls because they lack the typical links or attachments that are flagged by security teams, and instead initiate attacks on customers via phone numbers. This not only evades security teams but also catches busy users off guard," John Wilson, senior fellow responsible for threat research at Agari by HelpSystems told ZDNET. "

Read the full article here
 

Recent News
September 28, 2022
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
September 22, 2022
Agari, Alert Logic, Digital Defense, Digital Guardian, and Tripwire, all by HelpSystems, were recognized in Expert Insights’ “Best-Of” Awards for Fall 2022.
September 20, 2022
Whether intentional or otherwise, the Insider Threat poses a serious risk to business. HelpSystems’ experts, Bob Erdman, John Grancarich and Tom Huntington highlight the risks in this Digital Journal article and describe the solutions organizations can implement to help prevent malicious actors.
September 20, 2022
Credence Security, a leading regional distributor of specialized solutions in cybersecurity, forensics, governance, risk, and compliance, has signed a distribution agreement with HelpSystems, a cybersecurity and automation software provider, to deliver their expansive portfolio across the UAE and wider GCC region.
September 16, 2022

In his article for Tech Native, John Grancarich simplifies Zero Trust, and provides 7 steps organizations can take to implement a Zero Trust architecture.