How to quickly identify and stop the latest phishing techniques

clock • 2 min read

Join us to learn about the newest techniques deployed by attackers

Don't click on suspicious links. We all know that by now, don't we? But that doesn't guarantee that any of us can't be fooled just that one time that can make all the difference, and that includes IT professionals. Pride and complacency are dangerous traits.

So, it's best to assume that someone, somewhere in your organisation is going to be tricked by a phishing attack, particularly because the rules of the game are constantly changing. Can your colleagues quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk.

You need to stay a step ahead of the attackers, and that means knowing what to look out for. Join us on Tuesday 29th September, 3pm BST (4pm CET) for a webinar Combatting rogue URL tricks: How you can quickly identify the latest phishing attacks during which Javvad Malik, Security Awareness Advocate at KnowBe4, will be talking us through some common attack scenarios as well as some lesser known strategies that cybercriminals are starting to adopt.

Phishing is often just the first step in a multi-pronged attack strategy that can involve stealing data, planting spyware or deploying ransomware. All of these types of attack are on the rise and it's vital to take strong precautions to try to make sure the front door remains firmly shut and to ensure protections are in place should an attack get through.

Jaavad will dive deep into the latest techniques and defences to share:

  • Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
  • Safe forensic methods for examining URLs and other tactics for investigating phishy emails
  • Strategies for dissecting URLs on mobile without clicking
  • Simple ways you can train your users to scrutinise URLs and keep your network safe

We do hope you'll join us. Register today.

You may also like
What does your organisation look like through an attacker's eyes?

Security

Javvad Malik of KnowBe4 talks about how to cultivate a little-used skill when it comes to cybersecurity: empathy with the attackers

clock 15 November 2021 • 1 min read
How can you address the mutable threat of cybercrime?

Security

There’s only one constant when it comes to cyber-attacks, and that is that each one is different

clock 04 August 2021 • 3 min read

Security

And they're still iterating on their new tactics

clock 28 July 2021 • 3 min read
Most read
01

Intel splits in two, signs deal with Microsoft

22 February 2024 • 7 min read
03

Cambridge University hit by DDoS attack

20 February 2024 • 1 min read
04

Gemma: Google unveils open AI models

22 February 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

Operation Cronos: NCA reveals details of LockBit affiliates

Operation Cronos: NCA reveals details of LockBit affiliates

Operation has been crippled - for now

clock 22 February 2024 • 3 min read
Microsoft exposes state-backed hackers using AI tools for espionage

Microsoft exposes state-backed hackers using AI tools for espionage

Hackers linked to Russian military intelligence have been using LLMs to delve into satellite communication protocols relevant to military operations in Ukraine

clock 15 February 2024 • 3 min read
France uncovers massive Russian disinformation campaign

France uncovers massive Russian disinformation campaign

Dubbed 'Portal Kombat'

Vikki Davies
clock 14 February 2024 • 2 min read