Exclusive Content:

How an Asian mobile network operator gained full visibility into the security posture of its 4G and 5G networks

Cyber threats are increasingly persistent, complex, and sophisticated. At...

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to...

The new cyber threat: phoning a call centre

spot_img
spot_img

One cyber insurance specialist is warning brokers and clients of a ransomware attack method that subverts common cybersecurity controls by tricking victims into phoning a call centre – rather than clicking a link – and instructing them to download malicious software to infect their own computers.

“Making the victim do all the heavy lifting is a notable shift from the more traditional hacking attack vectors,” Tom Bennett, cyber threat analysis team leader with CFC Underwriting, said in a press release earlier this month. “Unfortunately, most workplace education around phishing emails doesn’t warn about this type of social engineering, so it represents a significant new threat.”

Dubbed ‘BazarCall,’ the scam targets small businesses by convincing victims through “good impersonations of legitimate companies” to visit a phishing site, phone a call centre and download a Microsoft Excel file to infect the victim’s network. For example, the phishing email may tell the victim a subscription has been renewed as requested and to call a phone number to cancel within 14 days if they don’t want to renew.

Read the complete article here

spot_img
spot_img
spot_img
spot_img

Newsletter

spot_img
spot_img
spot_img
spot_img
spot_img
spot_img

Don't miss

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to...

5 ways to win RFPs

Asset owners frequently depend on formal RFPs for manager...

Exploring the Relationship of Interest Rates to Value vs Growth Investment Strategies

After the economic turmoil caused by the COVID-19 pandemic,...

How an Asian mobile network operator gained full visibility into the security posture of its 4G and 5G networks

Cyber threats are increasingly persistent, complex, and sophisticated. At the same time, the security regulations that communications service providers (CSP) must comply with are...

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver for communications service providers (CSPs). Capacity planning, fulfillment, assurance, and maintenance activities have improved somewhat...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to know who your best buyers are and how to price your product. Ask yourself these...