#business-email-compromise

[ follow ]
Information security
fromSecuritymagazine
3 days ago

The Most Dangerous 6 Weeks of the Year

Holiday distractions and routine business patterns create windows for attackers to spoof vendor payments by altering bank details, leading to costly undetected invoice fraud.
Information security
fromSecuritymagazine
3 days ago

The Most Dangerous 6 Weeks of the Year

Holiday distractions and year-end transaction surges create ideal cover for attackers to alter routine vendor or payment details and bypass verification, causing costly fraud.
fromThe Hacker News
1 week ago

Discover the AI Tools Fueling the Next Cybercrime Wave - Watch the Webinar

Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a "Prince" in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and a $200 allowance can launch a campaign that rivals state-sponsored hackers. They don't need to be smart; they just need to subscribe to the right AI tool. We are witnessing the industrialization of cybercrime.
Information security
Information security
fromMedCity News
1 month ago

Phony Bank Account Change Requests: A Growing Threat for Healthcare Finance Leaders - MedCity News

Phony bank-account change requests exploit overburdened AP teams, leading to diverted payments and large unrecoverable financial losses.
Information security
fromSecuritymagazine
2 months ago

When Employees Help Hackers: How Threat Actors Bypass MFA

Criminals increasingly bypass MFA by tricking employees with sophisticated phishing, driving business email compromise and largely irretrievable wire fraud losses.
fromSecuritymagazine
3 months ago

Cybercriminals Attack VPS to Access Business Email Systems

Attackers now rent trust. Five dollar VPS nodes buy entry to your allow list and they accomplish this by getting a clean ASN and fresh IP making traffic feel like a trusted source, not a criminal. In this case, the adversary is riding live sessions and no longer just harvesting passwords. The mailbox becomes the control plane. Vague rules act like a kind of stealth policy.
Information security
US news
fromwww.mercurynews.com
4 months ago

S.F.: 2 men plead guilty to laundering millions from online phishing scams

Two men pleaded guilty to federal money laundering charges linked to extensive phishing and business email compromise schemes.
Information security
fromSecuritymagazine
6 months ago

Deepfake Scam or Inside Job? Rethinking the BEC Threat

The growing sophistication of BEC attacks, using deepfake technology, presents new challenges for businesses in verifying incidents and handling potential insider threats.
[ Load more ]