Phishing attacks remain a significant threat to organizations. According to the data presented by the Atlas VPN team, based on the survey conducted by Egress with 500 cybersecurity leaders, 92% of organizations were victims of phishing in the past 12 months, and 86% experienced negative consequences as a result.
The most commonly reported fallout from phishing attacks was financial losses from customer churn. Overall, 54% of surveyed organization leaders said they lost customers and revenue due to successful phishing attacks.
A company’s reputation, which may have taken years or even decades to build, can be irreparably damaged in just seconds due to a single security breach. Reputational damagewas reported by 47% of organizations that were impacted by phishing attacks in the last 12 months.
Moreover, over a fourth (27%) of organizations underwent lengthy remediations, while nearly a tenth (9%) faced legal repercussions.
However, phishing incidents did not only have repercussions for the victim organizations but also for the employees involved. In 30% of cases, the employees were disciplined as a result of the successful phishing event, while 22% of organizations reported that the employee was dismissed. In 18% of instances, employees left voluntarily.
72% of cybersecurity leaders express concern over AI’s use in phishing emails
Phishing has become an increasingly sophisticated cyber threat as cybercriminals continue to evolve their tactics. With the advancement of AI technology, there are concerns it may be misused to create more sophisticated cyberattacks.
Specifically, 72% of cybersecurity leaders are expressing worries about the use of AI in email phishing attacks. Cybersecurity leaders within financial organizations are the most alert about AI’s use to craft phishing campaigns — 80% showed concern.
These concerns arise from the potential for AI to automate the phishing process, which can make attacks more efficient and scalable. Additionally, AI can create highly sophisticated and personalized phishing emails that are difficult to detect using traditional security systems. The use of deepfake technology to add video and voice capabilities to phishing attacks can make them even more dangerous.
To read the full article, head over to: https://atlasvpn.com/blog/survey-92-of-organizations-fell-victim-to-phishing-in-the-past-12-months

Google Blocks Chinese App Pinduoduo Over Security Concerns
Posted in Commentary with tags China, Google on March 21, 2023 by itnerdGoogle has suspended the Chinese shopping app Pinduoduo after discovering that versions of the app not in the Play Store have been found to contain malware and the current version is “not compliant with Google’s Policy”. With approximately 900 million users, Pinduoduo is one of China’s most popular e-commerce platforms.
“Off-Play versions of this app that have been found to contain malware have been enforced on via Google Play Protect,” Ed Fernandez, a Google spokesperson said.
Google Play Protect scans for malicious apps installed on Android phones and will recommend that users uninstall them. Play Protect currently prevents users from installing the Pinduoduo app.
Furthermore, a Pinduoduo spokesperson said in a statement to CNN, “We are communicating with Google for more information. We have been told that there are several other apps that have been suspended as well.”
In a later statement Pinduoduo said it strongly rejects “the speculation and accusation that Pinduoduo app is malicious just from a generic and non-conclusive response from Google.”
It reiterated that “there are several apps that have been suspended from Google Play at the same time.”
Google Play has yet to confirm other suspended apps and has asked users with off-store, which is another way of saying side loading, versions to uninstall it.
Ted Miracco, CEO, Approov had this to say:
“Mobile attestation is the process involved in verifying that the app was signed by a trusted party and has not been modified since it was signed. If mobile app developers use Google Play Integrity for the attestation process involved, they leave substantial end-users out of the process as both Huawei and Xiaomi smartphones typically do not have access to Google Play attestation capabilities and many Samsung devices support app attestation through their own Samsung Knox (a mobile security platform that provide security features, including app attestation).
“It is incumbent on developers to ensure that only genuine apps can access the APIs, otherwise they are opening up their users to the possibilities of malware or credentials being stolen from the app. Attestation across all mobile platforms is both necessary to protect APIs and to ensure the safety of the end users.”
I didn’t see a mention of the Apple versions of this app in the CNN story. I am guessing that because it’s much harder (but not impossible) to slip such code into apps on Apple’s App Store. And apps on that platform need to be signed. Plus side loading isn’t a thing on iOS. Some clarification on that would be handy. But if that’s the case, then as stated above, Google needs to move towards that sort of model as that will keep people safer.
Leave a comment »