Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

What is Spear Phishing?

what_is_spear_phishing

In the last year, nearly 76% of businesses reported a phishing attack. Over 1.5 million new phishing sites are created every month. And phishing accounts for 90% of all data breaches. Phishing continues to be a growing concern for businesses and individuals that do any business online. Phishing, a social engineering attack typically delivered via email, impersonating a trusted brand […]

What is Whaling?

what_is_whaling_hero_image

Whaling phishing is a targeted attack directed at high-level company employees, such as a CEO or CFO. Like other phishing attacks, the goal of whaling phishing is to impersonate a trusted person or brand and, by using social engineering tactics, trick the recipient into relaying sensitive information or transferring funds to the attacker. In this […]

After the breach : Garmin and WastedLocker

after_the_breach_hero_image

This week, we saw a very public example of a ransomware attack on Garmin, with their production services and products going offline from July 23rd – 27th. Garmin, with a market cap of $19 Billion saw the attack impact everything from their manufacturing activities to their consumer and commercial services. Garmin’s public-facing impacts were far-reaching, […]

Phishing Examples

phishing_examples_hero_image

Phishing, a type of social engineering, occurs when a third party attempts to obtain sensitive information via fraudulent electronic communication. Historically, this transpires through email or a text, but other communication apps can be used, such as WhatsApp, Instagram direct messages, and Facebook Messenger. Sensitive information can include usernames, passwords, credit card information, social security […]

Your Next Ransomware Risk: Zerologon

ransomware_risk_hero_image

Last week, a new exploitable vulnerability in Microsoft Active Directory called Zerologon (CVE-2020-1472), was released publicly. Successful exploitation allows any user to become a Domain Administrator with global access to all computers in the enterprise in about 10 seconds. The vulnerability opens a quick path for criminal actors to conduct crippling business-wide lockdown and ransom […]