Protect Your Employees from Business Email Compromise Attacks

Menlo Imposter Risk Detection Flags Payloadless Assaults that Impersonate Senior Executives and Other VIPs
Cyberattacks aren’t often delivered by means of a payload this kind of as a hyperlink to a malicious URL or an contaminated file attachment. Somewhat than trick users into downloading malicious articles, attacks with out payloads—otherwise known as imposter threats—use pretend communications to get victims to carry out risky conduct, normally offline. These fakes involve emails this sort of as phony authorities requests for a Social Stability selection, a relative’s plea for a wire transfer, a request from the boss to release proprietary organization information and facts or, far more not too long ago, give up personal details in exchange for overall health details and therapies about Covid-19.