How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign
Just a few months ago, Votiro discovered a cleverly disguised, multi-stage phishing campaign targeting UPS, FedEx, and DHL customers. Download the case study, How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign to view the emails and Excel attachments from the phishing campaign. The case study also covers: What made these...
The Biggest Cyber Threat to Healthcare Insurance Companies in 2021
Every incoming file is a risk for health insurance companies. From a benefit claim sent from a hospital to an approval application uploaded from a patient all the way to a report sent from the CEO’s home computer – there is essentially no such thing as a safe file. Because health insurance companies must remain...
How We Prevented Malware Attacks at Hachshara Insurance
Handling as many as 300,000 incoming files each month, Hachshara receives claims forms, identification documents, and other mixed media from clients on a daily basis. With customer-facing services enabling incoming files via email and website upload, the risk of zero-day and other file-borne attacks presented a real challenge. Having no designated protection against file-borne threats,...
Do you know what your employees are downloading? Whenever employees download a file, they open your business up to attack. Threats often hide inside innocent-looking files, making them incredibly hard to spot, no matter how much training employees may do. And because today’s detection-based tools aren’t designed to catch every threat, we’re rolling the dice...
One Bank’s Success with Votiro Cloud for Email API
Seeking an innovative, best-of-breed solution to defend its email gateway, one bank had equipped itself with one of the best-known mail relay servers and a leading sandbox solution to detect all threats attempting to penetrate the bank’s network. On top of those, the bank had also licensed Votiro’s Cloud for Email API.
In this talk, Brent Hansen, Thales TCT’s CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at Votiro, dissected an April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.
Malicious Macros: The Holes in Microsoft Software That Hackers Hope You Don’t Know About
A macro is a mini program that is designed to automate a task within a larger program in order to make the user experience faster and easier. Macros are a legitimate and important component of any productivity software, including common Microsoft Office software for creating documents, spreadsheets, and presentations. Unfortunately, these efficiency-drivers are easily compromised...
How to Best Protect Your Enterprise Email from File-Borne Attacks
Many common cybersecurity technologies are powerless in an environment where undisclosed and zero-day attacks abound. With cybercriminals becoming more sophisticated than ever and investing enormous effort in preparing successful targeted attacks through email, a revolutionary approach to cyber protection is required. Download the eBook to learn more.
How to Plug the Gaps Found in Antivirus, Next-Gen Antivirus and Sandbox File Security
Many organizations believe that utilizing antivirus (AV), next-gen antivirus (NGAV), and sandbox security technologies is the best practice for file security. While these technologies are certainly important for threat prevention, each has its own vulnerabilities that can be exploited by malicious hackers seeking a way to disrupt business activity and make quick money. This eBook...
What’s in that Malicious File? A File Dissection Event
Organizations receive malicious files from emails, web uploads, and content-sharing platforms daily. File-borne attacks are on the rise and 40%-60% of malicious files evade and breach existing security defenses to end up in your inboxes, on your platforms, and in your network. We want you to send us those files. Seriously. Forward malicious files to...
Document upload threats can come from anywhere. Whether it’s contracts, claims or applications, accepting uploaded files from the web is necessary for your business to run. But there’s no telling where these files came from, or what threats could be hiding inside them. Today’s detection-based tools simply aren’t designed to catch every threat, which means...