Plaintext: The Next Attack Could Come Via Email
Welcome to Dark Reading in Plaintext, brought to your inbox this week by Deloitte. In this issue of Plaintext, we take a look at email-based threats
Hello, Inbox. Email is still the heart of the organization. We joke how “that meeting could have been an email.” Teams pass project status updates and meeting summaries back-and-forth. Much of our online communications
Attackers are targeting people’s inboxes with spam, messages booby-trapped with malicious attachments, and emails with phishing links. And sophisticated threat actors also rely on carefully-crafted email messages to trick victims into clicking on links or downloading malware. A recent Identity Defined Security Alliance (IDSA) report found that 93% of businesses suffered an email phishing attack in the past year.
According to the latest Data Breach Investigations Report – released last week – email was the initial attack vector for 98% of social engineering attacks
Attack groups are weaponizing the data stolen during ransomware attacks in follow-up BEC attacks.
Phishing – and spear phishing
Dark Reading in Plaintext is brought to you by?Deloitte.
Deloitte Cybersecurity Threat Trends Report 2023
Deloitte Cyber Threat Intelligence (CTI) analysts analyzed trends impacting the cyberthreat landscape. Analysis of trends is useful for threat forecasting
CVSS v4 in Public Preview. The Forum of Incident Response and Security Teams (FIRST) announced the public preview of the Common Vulnerability Scoring System v4.0 during its conference on June 8. The feedback period is open until July 31, and the official publication of the specification is expected sometime in the fourth quarter of 2023. CVSS 4.0 is significantly different from CVSS 3.1 (which was introduced in June 2019), as it focuses on using scoring metrics such as threat and environmental impact as well as the base score. Using the base score alone is not a good idea for prioritization because not enough real-time threat and supplemental impact details are represented. CVSS 4.0 also includes a supplemental metric, “Safety,” to reflect the vulnerability’s impact, the kind of tangible harm to humans it could cause. Scope, which exists in CVSS 3.1, is no longer a part of CVSS 4.0. Instead, Confidentiality, Integrity, and Availability scores will now be split into Vulnerable System and Subsequent System categories.
CVSS 4.0 also increases granularity, which means going from the older CVSS versions to the new ones will reduce the base score of currently known vulnerabilities. Under v3.1, scores published by vendors are often in the High or Critical range with scores above 7.0.
领英推荐
What We Are Reading
What We Heard On-Air
Tune in to our on-demand webinar?“Next-Generation Supply Chain Security” to hear how security teams have successfully implemented SBOMs into their overall security strategy.
"Why do these (supply chain attacks) keep happening? For me, it's about scope and scale." Evan Blair, general manager, North America, Searchlight Cyber
From Our Library
Check out some of the latest reports from our?Dark Reading Library.
On That Note
On June 22, Dark Reading is hosting a full-day free virtual event looking at how missteps and vulnerabilities can lead to security incidents and breaches. You will hear from industry practitioners and experts about tools and best practices to protect your organization’s data from ransomware, cyber extortion and other threats. You will get insights on what to do when you’ve discovered a compromise and how to limit its impact. Register to attend the Anatomy of a Data Breach: And What to Do If it Happens to You Virtual Event on July 22.
Development Lead
5 个月Thank you for sharing these insights. The statistics regarding email as the primary attack vector are alarming ?? but unfortunately common. It’s precisely to combat threats like phishing and Business Email Compromise (BEC) that Planck Security has developed a unique solution, going beyond traditional content-based protection methods. ?? Planck Security uses end-to-end encryption that secures communications from device to device, preventing anyone – including cloud service providers – from accessing sensitive emails or documents. Unlike standard solutions, encryption keys never leave the user’s device, offering complete protection against data theft and email-based scams. ?? Additionally, Planck ensures that every sender is fully authenticated, preventing sophisticated phishing attacks and guaranteeing that every received email is genuine and unaltered. I strongly believe that solutions like Planck Security can be a crucial ally in tackling the security challenges highlighted in this article.?