So far in our journey, we've laid the groundwork by introducing the concept of BEC attacks and exploring their rising prevalence. In Part 2, we delved into the mechanics of BEC attacks within O365...
Configuration of Office 365 to Detect BEC Attacks - Part 4
Sep 25, 2019
Welcome back to our series on safeguarding against Business Email Compromise (BEC) within Office 365. Previously, we've explored the rise of BEC attacks, their operational tactics, and essential ...
Optimizing Office 365 Settings to Shield Against BEC Attack - Part 3
Sep 4, 2019
In the initial segment of this series, we unveiled the mechanics behind Business Email Compromise (BEC) attacks and explored the reasons behind their surge. The subsequent part delved into the ...
Threat Investigation: Anatomy of a Business Email Compromise Attack - Part 2
Aug 5, 2019
Business e-mail compromise (BEC) is a class of cybercrime that is growing rapidly. Over the past five years, BEC attacks have resulted in billions of dollars in losses from companies of all sizes...
The Unassuming Threat: Business Email Compromise and the Role of Managed Detection & Response - Part 1
Aug 4, 2019
Globally, businesses of every scale are confronting the escalating threat of Business Email Compromise (BEC), a cybercrime that has bilked organizations out of billions over the past decade. The...