Breaking News

Plishing Attacks

phishing

This article below is an excellent for understanding Plishing Attacks today. To summarize don’t click on email links unless you are absolutely sure of its origin. Keep a good plishing tool to check your email links.

The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even worse if a stolen identity belongs to a privileged user, who has even broader access, and therefore provides the intruder with “the keys to the kingdom”.

74 percent of respondents whose organizations have been breached acknowledged the incident exploited privileged account access. This number closely aligns with Forrester’s estimate that 80 percent of security breaches involve compromised privileged credentials. By leveraging a “trusted” identity a hacker can operate undetected and exfiltrate sensitive data sets without raising any red flags. As a result, it’s not surprising that most of today’s cyber-attacks are front ended by phishing campaigns. So, what can organizations do to prevent their users from falling for the bait of these attacks? 

More info from Tortsen George at Security Week

danwillie

Hi danwillie blogger at large at sites like America-in-2020.com, 4UScyber.com, USALive .today, SolarWindWaterDIY.com and many others. Danwillie is my blogging name. Go to danwillie .com to find out more. Webmaster, Blogger, 40 years in computer network services

Leave a Reply

Your email address will not be published. Required fields are marked *

Skip to content