Analyst Spotlight: TruSTAR Intel Architect Discusses the Evolution of Phishing Attacks

TruSTAR recently spoke at RH-ISAC’s Retail Cyber Intelligence Summit about best practices and insights about intelligence fusion. A major component to fusion and managing your intelligence is phishing triage. In this follow-up Q&A, we sat down with TruSTAR Intelligence Architect Neal Dennis to discuss phishing trends, its impact on consumer-facing companies, and how security teams can defend themselves…

Read More

It’s National Cybersecurity Awareness Month!

It’s National Cyber Security Awareness Month (NCSAM) 2019! RH-ISAC is proud to celebrate this year as an official NCSAM Champion. Held every October, NCSAM is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and ensure safe practices online. Now in its 16th year, NCSAM continues to build momentum…

Read More

RH-ISAC Joins Far-Reaching Initiative to Promote the Awareness of Online Safety and Privacy for National Cybersecurity Awareness Month

WASHINGTON, D.C., September 18, 2019 — The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) today announced its commitment to National Cybersecurity Awareness Month (NCSAM), held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative…

Read More

Progress in the Global Fight against Fake Emails

Valimail has been doing rigorous analysis on the data behind email frauds since the company’s earliest days. And we’ve been publishing research reports based on that deep insight for several years. Valimail’s research program now sets the industry standard for reliable, hype-free data on the state of email fraud, email authentication, and identity-based email attacks….

Read More

Social media is a threat actor’s recon tool

Social media networks like Facebook, Instagram, Twitter and LinkedIn were originally designed to connect people all over the world. Now, it has become an active underworld for threat actors seeking personal and organizational information from users. Social media has become a reconnaissance tool – a tried and true method of collecting data – to hijack…

Read More