Threat Intelligence Insider: September 2023

Threat Intelligence Insider: September 2023

This attack bypassed Microsoft and the SEG

In under 3 minutes, Co-founder and CTO, Ed Bishop, will walk you through a real business email compromise attack. In this example, the attacker impersonates an internal employee looking to change their bank account details. With no malicious urls or attachments, how did Tessian catch it??

This is the second customer threat study in an ongoing series. Stay tuned for more!

Watch Now


What’s New

What is an image-based phishing attack? Attackers are placing text content and malicious payloads within an inline image file to avoid detection by email security tools.?

As an example, the above image appears to be text-based. Instead it's a jpg. file with a malicious payload underneath — attempting to evade text-based detection tools.

Tessian’s response: We’ve implemented an image similarity denylist to store fingerprints for images that we’ve seen used in phishing attacks. For new inbound emails that contain a large inline image, Tessian Defender will compare the image to our denylist and flag if similar.?

Check out Defender


From on-prem to the cloud in 4 stages

“How do these products work with my current tech stack?”

“Is my business ready to take the leap?”

No matter where you are in your digital transformation journey — from on-prem infrastructure to the cloud, this guide is for you. On the blog, we walk through the 4 stages to complete cloud email security.

Read the Blog


A word from our customer

B. Riley Financial implemented Tessian and has seen a reduction in overall attacks and a reduction in administrative time needed to address attacks.?

“We’ve seen the financial savings of course, but we also see the administrative hours savings.” - Aaron Goodwin, CISO at B. Riley

Watch the Video

Matthew Q. Smith

Chief Commercial Officer (CCO) @ Functionize | Startup Investor & Advisor

1 年

Love this

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了