Friday Five 6/10 | Digital Guardian

The Industry’s Only SaaS-Delivered Enterprise DLP

Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.

No-Compromise Data Protection is:

  • Cloud-Delivered
  • Cross Platform
  • Flexible Controls
DATAINSIDER

Digital Guardian's Blog

Friday Five 6/10

by Robbie Araiza on Friday June 10, 2022

Contact Us
Free Demo
Chat

Read up on how Apple is getting ahead of the curve on security, how you could be targeted in a Facebook phishing scam, why a different type of cyberattack could surpass ransomware, and more all in this week’s Friday Five!

1. Facebook users targeted in massive phishing campaign by Christopher Boyd

Facebook is said to have been the launchpad for a large-scale phishing campaign that saw the stealing of one million credentials over the course of four months, according to researchers at PIXM. Read more about how the phishing attack works, the status of the phishing campaign, and tips to avoid such attacks on Facebook, which include:

  • Avoiding needlessly logging in for a second time
  • Enabling two-factor authentication
  • Adding login alerts to your Facebook account

Read more

2. FBI takes down dark web marketplace for U.S. citizen personal data by Tonya Riley

Only weeks after seizing weleak.to, the FBI announced this past Tuesday that they took down the dark web marketplace known as SSNDOB, which has sold the personal data of nearly 24 million U.S. citizens during its operation. “Services like SSNDOB enable several different kinds of digital fraud by giving cybercriminals access to stolen PII,” according to researchers at Chainalysis. Read more to find out how much money this operation made and what the takedown means for those whose information has been compromised.

Read more

3. Hackers are now hiding inside networks for longer. That's not a good sign by Danny Palmer

According to cybersecurity researchers at Sophos, cyber criminals now spend a median of 15 days inside compromised networks, which is up four days compared to the year before. "It seems pretty obvious you don't want people in your network, but the longer they have, the more time they have to completely compromise the environment. If they're having to move quickly they might miss something," said John Shier, senior security advisor at Sophos. Read the full report to learn more about which organizations struggle the most to detect suspicious activity, how attackers are gaining access to systems, and how malicious access can be prevented.

Read more

4. Apple's New Feature Will Install Security Updates Automatically Without Full OS Update by Ravie Lakshmanan

According to a recent statement released by Apple, macOS Ventura and iOS 16 will be adding a Rapid Security Response feature that will deploy security updates without the need for a device restart. These security updates will be kept separate from regular software updates, meaning that users will be more quickly protected against emerging threats. Read more about this update along with other upcoming security updates from Apple in the full piece from The Hacker News.

Read more

5. The Hacker Gold Rush That’s Poised to Eclipse Ransomware by Lily Hay Newman

Recent findings indicated that business email compromise—that is, infiltrating a legitimate corporate business email account to use in scams—may soon overtake ransomware as the most ideal form of attack. While business email compromise is said to rely more on social engineering compared to ransomware, when successful, it has been found to be the most profitable type of scam while carrying less risk. Find out more about what may cause this shift in the full article from Wired.

Read more

Tags: Email Security, Ransomware, Phishing

Recommended Resources


  • The seven trends that have made DLP hot again
  • How to determine the right approach for your organization
  • Making the business case to executives
  • Why Data Classification is Foundational
  • How to Classify Your Data
  • Selling Data Classification to the Business

Robbie Araiza

Robbie is a Content Creator for the Data Protection team at HelpSystems. Prior to joining the organization, he studied psychology and social work at Texas State University in San Marcos, TX.