Tag

Spoof Attack Prevention

Covers strategies and tools for preventing spoof attacks, including email spoofing, caller ID spoofing, and website impersonation. Articles explore detection techniques, authentication protocols like SPF and DKIM, and organizational policies that reduce exposure to spoofing threats.

posts

Spoofing

Spoof Attacks: How Threat Actors Impersonate You

In July 2021, the FBI's Internet Crime Complaint Center reported that business email compromise — overwhelmingly powered by spoof techniques — cost victims over $1.8 billion in 2020 alone. That made it the single most financially damaging category of cybercrime they tracked. Not ransomware. Not credential theft. Spoofing-driven impersonation.

Carl B. Johnson Aug 24, 2021 8 min read
Spoofing

Spoof Attacks: How Threat Actors Trick Your Defenses

The CEO Email That Cost a Company $47 Million In 2015, Ubiquiti Networks disclosed that attackers impersonating company executives via spoofed emails tricked employees into wiring $46.7 million to overseas accounts. The emails looked legitimate. The sender addresses appeared correct. No malware was involved. The entire attack hinged on

Carl B. Johnson Jun 18, 2019 7 min read