Cofense Simulator was designed to change risky employee behavior when it comes to being able to recognize and report malicious phishing emails.The Cofense methodology entails periodically immersing employees in simulated real-life phishing scenarios.
These scenarios deliver targeted security education directly to their inboxes, and instantly present bite-sized, engaging training to those found susceptible.
Typically thought of as less vulnerable to viruses and malware, ransomware hackers are now successfully targeting OS X systems through sophisticated phishing emails that use KeRanger malware to encrypt the data on a coputer and render it inaccessible until a ransom is paid in bitcoins.
Using phishing to trick an unsuspecting employee, attackers seized the hospital’s entire IT system, stalled critical healthcare related communications and extorted $17,000 in ransom.
Using phishing emails targeted at employees researching grants, hackers compromised three servers before city officials were able to pull them offline, effectively locking up the town’s files in order to receive a small sum until the officials turned to law enforcement for help.
News reports are now confirming that this is the latest in a series of phishing-related ransomware attacks on healthcase facilities; while it wasn’t known at the time of this release if a ransom had been paid, media has said the facility confirmed that systems critical to patient care for thousands were locked for a time.
Cybersecurity Expert Jim Hansen reveals findings from the latest Q1 Malware Review in this new ISMG podcast.
93% of all phishing emails contain ransomware, according to the latest PhishMe report
Ransomware targeting US Congress specifically? Probably not.
PhishMe tracks down and exposes Criakl, OSX and other attackers in our latest research report
Locky - New Malware Borrowing Ideas from Dridex and Other Ransomware
You're infected! Ransomware with a twist