Главная
Study mode:
on
1
Intro
2
What is Business Email Compromise
3
How do people come after you
4
Why is this important
5
Business Email Compromise
6
How do they find out about you
7
They want to come after you
8
Lookalike domains
9
Singapore Air domain
10
SharpMail
11
Who is that
12
Reply to
13
SMTP relays
14
Example
15
Breach Related Compromise
16
How do you stop this
17
Employees
18
Processes Policies
19
Email Security Gateways
20
SPF
21
External Labels
22
Blacklisting
23
Deleting Exchange
24
Report it
Description:
Explore the rapidly expanding cybercrime of Business Email Compromise (BEC) in this informative Black Hat conference talk. Delve into the reasons behind the 1300% increase in reported cases from 2015 to 2016, and understand why this financial fraud scheme targets organizations of all sizes across various market segments. Learn about the tactics used by cybercriminals, including lookalike domains, SMTP relays, and breach-related compromises. Discover effective countermeasures such as employee training, implementing robust processes and policies, and utilizing email security gateways. Gain insights into the importance of SPF, external labels, and blacklisting in combating BEC. Understand the crucial steps of reporting incidents and the potential consequences of falling victim to this lucrative cybercrime.

Phishing for Funds - Understanding Business Email Compromise

Black Hat
Add to list
00:00
59:45