TLDR: Simulated exercises conducted by the University of Utah’s Information Security Office (ISO) are helping users identify and avoid phishing attacks. The exercises aim to educate users about the common red flags indicative of phishing emails and increase awareness of the techniques used by cybercriminals to elicit personal information, install malware, and gain unauthorized access to systems. The ISO emphasizes that the simulated phishes do not capture or leak usernames and passwords and that a threat actor does not gain any information. Instead, the exercises provide a safe environment for users to learn what to look for and practice how to report malicious messages. Users who open links in a simulated phish are enrolled in security awareness training, which covers key tactics used in each exercise. The ISO reminds users to be cautious and to report any suspicious emails using the Phish Alert button. By reporting phishing attempts, users can help the SOC remove the malicious messages from other inboxes and prevent potential cybersecurity crises.
Simulated exercises: spot, dodge phishing
Latest from Blog
Get the inside scoop on cybersecurity with Contrast CISO David Lindner
TLDR: SQL injection remains a problem that can be prevented with application detection and response. Implementing multi-factor authentication can help lower cybersecurity insurance costs. CISA’s role in election disinformation highlights the need
Stay ahead with the Cybersecurity Pulse Report: Black Hat 2024 Edition
Cybersecurity Pulse Report – Black Hat 2024 Edition Summary TLDR: This will be uploaded to wordpress and so you can start with a Cybersecurity Pulse Report – Black Hat 2024 Edition Key
Moody’s: Cyber insurance competition rises, prices fall
Moody’s Ratings: Cyber Insurance Competition Up, Prices Down TLDR: Cyber insurance market poised for growth due to increased demand. New players entering the market may decrease premiums. Article Summary The cyber insurance
Syxsense acquires Absolute to beat cyber vulnerabilities with strength
TLDR: Absolute Security has acquired Syxsense to enhance its cyber resilience platform. The acquisition will simplify patching and remediation issues through automation. Article Summary: Absolute Security has acquired Syxsense to improve its
Apache’s OFBiz gets new fix for RCE exploits
TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code
Feds caution: Russia-linked CVE threats target essential infrastructure
TLDR: Threat groups linked to Russia’s military intelligence service are targeting critical infrastructure in various sectors. The attackers have defaced websites, scanned infrastructure, and leaked stolen data. Summary: Federal authorities in the
Allies blame Russian military for destructive cyber-attacks
TLDR: US and allies accuse Russian military of launching cyber-attacks targeting critical infrastructure for espionage and sabotage purposes. Unit 29155, a cyber group affiliated with the Russian military, is responsible for deploying
Brazil bans X, and Tom Alcock on cybersecurity talent hunt
TLDR: Key Points: Brazil banned X (Twitter) due to misinformation during the presidential election. Tom Alcock, founder of Code Red Partners, discussed the importance of cybersecurity talent recruitment beyond traditional methods. In
Palo Alto Networks acquires IBM’s QRadar Assets in SIEM victory
Article Summary TLDR: Palo Alto Networks has acquired IBM’s QRadar SaaS assets to enhance its cybersecurity capabilities. The integration of QRadar’s assets into Palo Alto Networks’ Cortex XSIAM platform will lead to
NIST CSF 20: Secure your cyber world with confidence framework
TLDR: NIST has released Version 2.0 of its Cybersecurity Framework (CSF) with an enhanced focus on Privileged Access Management (PAM) and Identity & Access Management (IAM). Key updates in NIST CSF 2.0