Anatomy of a Phish: New Varonis eBook Connects Social Attacks and APTs to Human-Generated Data

Anatomy of a Phish: New Varonis eBook Connects Social Attacks and APTs to Human-Generated Data

Security analysts have been telling us that phishing incidents have been on the rise, and the threat will get worse in the coming years. Sure phishing and other social attacks are insanely clever, tricking victims into effectively inviting hackers in through the front door. But when cyber thieves also use advanced persistent threats or APTs—embedding this stealthy malware in the phish mail—the attack becomes even deadlier.

You can think of this as a one-two punch: the social part targets the humans, and the APTs go after the human-generated data, which is often poorly permissioned.

It’s a new kind of attack that requires a different way of looking at data security. If you need to get up to speed quickly on why current security techniques won’t stop these types of attacks and what you need to do differently, we have the answer.

We’ve just published an eBook called “Anatomy of a Phish: Exploring the new security threats from social attacks, and what to do about them”.

“Anatomy of a Phish” explains the human-factors behind employees clicking on “phishy” URLs, why clear-text data containing sensitive information will disperse throughout an organization’s file system, and the techniques that APTs use to hunt down this data and exfiltrate it without triggering any alarms. We also provide actionable tips that will help direct your prevention and mitigation programs.

And we’ve made the content incredibly accessible. If you need a few quick nuggets of information, you can browse through some of the highlights in the condensed web-version below. Tablet-centric folks can download ePub format, which will directly display in an iBooks or Kindle app, and traditionalists have their PDF version.

Finally, “Anatomy of a Phish” will soon be  is now available in the iTunes store, for free of course.

anatomy-of-a-phish---webcover

 

Get the latest security news in your inbox.

Next Article

The ‘Varonis Track’ at RSA 2014