Krebs on Email Security: Understanding the Attacks That Matter Most

March 7, 2022

Brian Krebs has been one of the most well-known names in the industry over the last decade. Since starting at The Washington Post, Brian has been responsible for breaking stories on high-profile data breaches and exposing the inner workings of cybercriminal actors. Now, he operates KrebsOnSecurity.com, where information security professionals like myself go for details on the latest cyber threats.

He’s truly a legend in the cybersecurity space, which is why I’m so thrilled to be speaking with him next week during a webinar on the attacks that matter most in the email space. If you’re interested in hearing from the true expert in security, plan to join us for a live-only webinar on Thursday, March 17th at 1:00 pm ET.

Highly-Targeted Attacks Could Target You

Throughout the last decade, threat actors have moved from high-volume, low-impact attacks like spam and credit card phishing to more highly-targeted, high-value attacks like business email compromise and supply chain fraud. They impersonate your executives, hijack existing conversations, convince your finance team to pay fake invoices, and more. And the bad news is that it’s just getting started.

These attacks account for billions of dollars lost each year. While much lower in volume than traditional spam messages, these attacks are much more dangerous—not only due to their nature but also because they bypass traditional security tools like the secure email gateway. Once they enter user inboxes, they can wreak havoc as the victims send wire transfers, buy gift cards, or provide sensitive data to the attackers.

Hear the Krebs Perspective

Next week, Brian Krebs and I will be discussing these exact topics, alongside his predictions on what could happen next in the threat landscape. As cybercriminals shift their tactics, individuals and organizations alike should be prepared to defend themselves against attack. Join us for the webinar to hear how these modern attacks are evolving and what Brian Krebs thinks you need to know in order to defend against them.

Register now and be sure to attend live on March 17th, as this session will not be recorded. We’ll see you there!

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More
B Overhauled Architecture Blog 08 29 22
As our customer base has expanded, so has the volume of emails our system processes. Here’s how we overcame scaling challenges with one service in particular.
Read More
B Winning Back Productivity
Limiting time-wasting email messages makes employees more productive. Here’s how innovative organizations are addressing the challenge.
Read More
B Account Takeover Blog 08 22 22
Learn how threat actors execute account takeovers, how they exploit compromised accounts, and what you can do to reduce your risk.
Read More