1.0 Introduction In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to...

Sep 25, 2019
1.0 Introduction In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to...
Sep 4, 2019
In Part 1 of this blog series, we introduced Business E-mail Compromise(BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to discuss how BEC...
Aug 5, 2019
The Unassuming Threat: Business E-Mail Compromise & Office 365 Vulnerabilities Business e-mail compromise (BEC) is a class of cyber-crime that is growing rapidly. Over the past five years, BEC...
Aug 4, 2019
Across the globe, companies and organizations of all sizes have faced an increasing onslaught of the cyber-crime known as business e-mail compromise (BEC). Perpetrated by organized crime groups, BEC...
Jun 24, 2019
It is with great pleasure that I introduce you to the new blog from SecureSky. The SecureSky mission is to assist our clients in utilizing cloud-native and third-party technologies to accelerate...