01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Phishing Techniques in Disguise: What to Look <strong>for</strong> And<br />

Why You Should<br />

By By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto<br />

Phishing is a familiar concept to cybersecurity professionals - and hackers. According to a recent study,<br />

phishing attacks are the method of choice of cyber criminals attempting to infiltrate an organization. Why?<br />

Because they are easy to deploy and the opportunity <strong>for</strong> human error when clicking on a phishing email<br />

is high.<br />

When many of us hear the term “phishing” we may picture an obvious spam email that came from an<br />

easily recognizable fake email address. But it isn’t always that simple to spot a phishing attempt. It’s<br />

important to educate organizations on ways to avoid falling victim to phishing attempts, including how to<br />

identify the different shapes they can come in. Recently, Datto SaaS <strong>Defense</strong> detected a threat that was<br />

disguised as a communication hosted on a trusted domain, which enabled the attackers to operate below<br />

the radar of detection.<br />

New technique bypasses security detection<br />

This new phishing technique included two key elements that made it impossible <strong>for</strong> most security<br />

solutions to detect. The attack leveraged Adobe InDesign hosting reputation to hide a malicious link in<br />

an inframe. With the goal of harvesting users’ credentials, the attack was sent via email to lure users into<br />

clicking a link to access a shared document. The link directed people to a fake webpage designed using<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 74<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!