Abnormal Security has released its H2 2024 Email Threat Report, revealing the growing threat of file-sharing phishing attacks, whereby threat actors use popular file-hosting to manipulate victims into revealing confidential information or downloading malware onto devices.
The report calls attention to the shift from traditional threats to behavior-based attacks, strongly emphasizing the need for organizations to focus on protecting humans as their most vulnerable targets.
Key highlights from the report showed:
- 350% Year-over-year growth in file-sharing phishing attacks
- How BEC attacks grew by more than 50% over the last year
- Construction and engineering firms, as well as retailers and consumer goods manufacturers, were most vulnerable to VEC attacks, with 70% of organizations receiving at least one VEC attack in the first half of the year.
Download the full H2 2024 Email Threat Report, “Bait and Switch: File-Sharing Phishing Attacks Surge 350% ”, here.
Related
This entry was posted on August 14, 2024 at 9:00 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
File-Sharing Phishing Attacks Surge 350%, According to New Research from Abnormal Security
Abnormal Security has released its H2 2024 Email Threat Report, revealing the growing threat of file-sharing phishing attacks, whereby threat actors use popular file-hosting to manipulate victims into revealing confidential information or downloading malware onto devices.
The report calls attention to the shift from traditional threats to behavior-based attacks, strongly emphasizing the need for organizations to focus on protecting humans as their most vulnerable targets.
Key highlights from the report showed:
Download the full H2 2024 Email Threat Report, “Bait and Switch: File-Sharing Phishing Attacks Surge 350% ”, here.
Share this:
Like this:
Related
This entry was posted on August 14, 2024 at 9:00 am and is filed under Commentary with tags Abnormal Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.