New Phishing Scam Targets Teleworkers with Bogus Microsoft Teams Notification

cofense logoWith the influx of remote workers, it’s a perfect opportunity to flood people’s inboxes with malicious emails and fake links. The Cofense Phishing Defense Center (PDC) recently uncovered a phishing campaign that targets employees to harvest their Microsoft credentials. Ironically, the phish was found in an environment protected by Microsoft’s own secure email gateway (SEG). The phishing email, which was reported to the PDC using the Cofense Reporter button, included a well thought out “AudioChat” notification link supposedly from Microsoft Teams.


WFH? We Know a Thing or Two.

accessdata logoIf you’re starting to get stir crazy working from home, you’re not alone! Luckily, many of us at AccessData have been working out of home offices for years, so we thought we would ping our experts for some of their favorite tips and tricks!


Partner Q&A: Protecting Critical Healthcare Infrastructure from Disruption

VMRay Logo 400x120Healthcare facilities around the world are under overwhelming pressure right now as the COVID-19 pandemic is straining every facet of their organizations. Adding to this challenge is the fact that criminal organizations are showing no signs of letting up. INTERPOL warned that cybercriminals are increasingly attempting to ‘lockout hospitals out of critical systems by attempting to deploy ransomware on their networks despite the ongoing COVID-19 outbreak.”


Phishers’ Favorites: Microsoft ist zurück auf dem 1. Platz, Datei-Phishing verbreitet sich und Banken werden genutzt, um E-Mail-Kennwörter zu sammeln

vadesecureHeute haben wir die Phishers‘ Favorites-Liste für das 1. Quartal 2020 veröffentlicht. In dieser achten Ausgabe präsentieren die Phishers‘ Favorites die 25 in Phishing-Angriffen am häufigsten nachgeahmten Marken, basierend auf der Anzahl der eindeutigen Phishing-URLs, die von Vade Secure innerhalb des Quartals erkannt wurden. Da wir 600 Millionen Postfächer in 76 Ländern schützen, haben wir einen einzigartigen Überblick über den globalen E-Mail-Verkehr und die Phishing-Kampagnen, die sowohl auf E-Mail-Konten von Verbrauchern als auch von Firmen abzielen.


Attention CISOs: Get Answers to Your Top Questions

threatquotient logo 400x160At the helm of their security organization and often in the “hot seat”, CISOs can feel alone as they try to understand the rapidly evolving external threat landscape and focus on what truly matters. But they really aren’t alone. CISOs across organizations struggle with many of the same questions, including:


The Case for Cross-Training

Rangeforce Logo 400x160It’s long been said that it takes a thief to catch a thief. With cybercriminals continuing to evolve and develop an increasing specialization, can we then presume that the deeper each defenders’ knowledge grows across various cybersecurity skills, e.g., hacking, DoS attacks, SQLi, reverse engineering, threat hunting, and others, the better prepared your entire team will be to detect and contain future attacks quickly?


Okta’s Commitment to Social and Environmental Responsibility

okta logo 400 colorAt Okta, we live by our core values: love our customers, act with integrity, never stop innovating, be transparent, and empower our people. We put these into practice with our co-founder led weekly All Hands meetings and by giving back to our communities — we took the 1% Pledge prior to our IPO, offer frequent employee volunteering opportunities, and as the COVID-19 pandemic was unfolding, we devoted our resources to supporting those in need. We also made a swift decision to offer Okta for Emergency Remote Work to companies struggling to enable their teams to work from home. We put our values to work no matter what’s going on in the world and no matter what we’re working on. And now, we're taking the next step in putting these values to work with the launch of our environmental, social and governance (ESG) program.


Phishers Continue to Spoof WebEx

cofense logoLast month, the Cofense Phishing Defense Center (PDC) observed a new phishing trend wherein threat actors spoofed WebEx pages to harvest Office365 (O365) credentials. Since the posting of the original blog, the PDC has seen an increase in the number of similarly themed WebEx phishing attacks, yet another example of attackers leveraging the rapid shift to remote work in light of COVID-19 concerns. As many organizations and their workforce are increasingly dependent on remote working tools and solutions, reducing the attack surface (the number of different approaches a threat actor can use to enter or extract data) of such online platforms and services is becoming even more critical.


So hat das Coronavirus unsere Arbeitsweise beeinflusst

kasperskyCOVID-19 hat die Cyberbedrohungs-Landschaft der Unternehmen radikal verändert. Quarantänemaßnahmen haben eine große Anzahl von Menschen gezwungen, ihren gewohnten Arbeitsplatz ins Homeoffice zu verlagern. Um rechtzeitig auf diese Änderungen reagieren zu können, haben wir Expertenprognosen und -recherchen, sich ändernde Kundenanfragen und cyberkriminelle Aktivitäten sorgfältig untersucht. Was uns jedoch fehlte, war der Standpunkt eben dieser Mitarbeiter, die momentan von zu Hause arbeiten. Um also ein Gesamtbild zu erhalten, haben unsere Kollegen weltweit mehr als 6.000 Arbeiter befragt, um mehr über ihre Sichtweise und Perspektive zu erfahren. Die Ergebnisse möchten wir in diesem Blogbeitrag mit Ihnen teilen.



ExtraHop logo 400x160kOver the past several years, network monitoring has gotten a lot trickier. Network packets are becoming increasingly difficult to collect, according to the Gartner Market Guide for Network Performance Monitoring and Diagnostics (NPMD). Cloud-native architectures are replacing hub-and-spoke network designs rapidly. Gone are the days when IT Ops and SecOps could simply leverage traditional network monitoring stacks to monitor traffic. Cloud speed, scale, and dynamism have put us in the middle of an information architecture revolution nearly as dramatic as the Tesla Model Y replacing the horse-and-buggy.


ectacom HQ München

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn

ectacom Wien

ectacom GmbH
Am Europlatz 2
A-1120 Wien

ectacom Poland

ectacom GmbH - Branch in Warsaw
+48 501 295 580
Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!