Cofense Pioneers New Phishing Simulation Certification Program for Security Awareness Professionals

Global leader in phishing defense unveils the first-and-only industry certification for phishing simulation programs

LEESBURG, VA – March 29, 2018 – Cofense TM, the leading provider of human-driven phishing defense solutions worldwide, today introduced Cofense PhishMeTM Certification for professionals who administer phishing simulation programs to safeguard their organizations against email-based attacks. Cofense created the phishing simulation industry by launching its Cofense PhishMe solution in 2008. The company continues to pioneer in this market segment by unveiling the first and only phishing simulation certification program of its kind.  

Become the First Security Awareness Professional to be Fully Certified in Phishing Simulation Programs with Cofense

Want to boost your anti-phishing and your professional creds? Now you can, in just a few hours and on your own schedule.

Cofense™  is pleased to announce the Cofense PhishMe™ certification, the industry’s first and only professional certification for phishing simulation programs. It’s your chance to fully master Cofense PhishMe, our award-winning phishing awareness training solution, while becoming a certified expert in phishing simulation programs.

As Mobile Email Access Increases, Cofense™ Introduces Mobile Device Reporting as Latest Innovations in the Fight Against Phishing Threats

Cofense continues to improve the ability to condition employees to phishing attacks and provide the ability to report from anywhere

LEESBURG, VA. – March 28, 2018 – Cofense™, the leading provider of human-driven phishing defense solutions worldwide, today announced product feature innovations to Cofense PhishMe™ and Cofense Reporter™ to better fight the escalating threat of phishing attacks.

Analysing TrickBot Doesn’t Have to be Tricky

New additions to the TrickBot malware’s capabilities, observed by the Phishing Defence Centre, indicate that this malware tool is undergoing active development. The designers of this malware are still working hard to introduce new functionality including a network worm functionality and a screen-lock module. The worm component utilises the leaked “EternalBlue” exploit for CVE-2017-0144 to propagate itself across networks that have yet to patch or discontinue the use of SMBv1. The deployment of the screen-lock module (which appears to be still in the early phases of development) gives the threat actors the ability to change the functionality of the malware from robust banking trojan to a rudimentary ransomware.

Over half of European companies unprepared for email-based cyberattacks

Research shows that European companies receive more suspicious emails than their US counterparts

London, UK – March 27, 2018 – Today Cofense™, the leading provider of human-driven phishing defence solutions worldwide, announced the results of its European-wide Phishing Response Trends Report, which looked at the phishing response strategies of IT security decision-makers across a variety of industries throughout Europe. The report found that 45 percent of European countries are not prepared for a phishing attack, despite 78 percent of IT professionals having dealt with a security incident originating from a deceptive email. This was significantly lower than the 66 percent in the US that had dealt with a similar incident.

Gamers, beware. You are a target for crypto-mining botnets.

Many gamers are unaware that they are either potential targets for mining botnets or that they may already be mining cryptocurrencies for cybercriminals.

Why are gamers targets? Think about it. Mining requires a large graphics card (GPU), a dedicated Internet connection and an uninterrupted power source. Gamers use powerful and immersive, high-performing GPU’s to stay online and play networked games without interruption. It’s the perfect recipe for crypto mining.

Sigma Ransomware Resurfaces Following a Three-Month Disappearance

Cofense Intelligence™ uncovered a resurgent Sigma ransomware campaign on March 13, 2018 following a noted three-month hiatus of the malware. Although many aspects of this campaign—including its anti-analysis techniques—are consistent with previously analyzed Sigma samples, its return is in and of itself atypical.