Threat Intelligence Insider: September 2023
This attack bypassed Microsoft and the SEG
In under 3 minutes, Co-founder and CTO, Ed Bishop, will walk you through a real business email compromise attack. In this example, the attacker impersonates an internal employee looking to change their bank account details. With no malicious urls or attachments, how did Tessian catch it??
This is the second customer threat study in an ongoing series. Stay tuned for more!
What’s New
What is an image-based phishing attack? Attackers are placing text content and malicious payloads within an inline image file to avoid detection by email security tools.?
As an example, the above image appears to be text-based. Instead it's a jpg. file with a malicious payload underneath — attempting to evade text-based detection tools.
Tessian’s response: We’ve implemented an image similarity denylist to store fingerprints for images that we’ve seen used in phishing attacks. For new inbound emails that contain a large inline image, Tessian Defender will compare the image to our denylist and flag if similar.?
From on-prem to the cloud in 4 stages
“How do these products work with my current tech stack?”
“Is my business ready to take the leap?”
No matter where you are in your digital transformation journey — from on-prem infrastructure to the cloud, this guide is for you. On the blog, we walk through the 4 stages to complete cloud email security.
A word from our customer
B. Riley Financial implemented Tessian and has seen a reduction in overall attacks and a reduction in administrative time needed to address attacks.?
“We’ve seen the financial savings of course, but we also see the administrative hours savings.” - Aaron Goodwin, CISO at B. Riley
Chief Commercial Officer (CCO) @ Functionize | Startup Investor & Advisor
1 年Love this