fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Office 365 Will Help Admins Find Impersonation Attack Targets

Office 365 Will Help Admins Find Impersonation Attack Targets

Microsoft will make it easier for Defender for Office 365 customers to identify users and domains targeted in impersonation-based phishing attacks as recently revealed on the Microsoft 365 roadmap.

Defender for Office 365 (previously known as Office 365 Advanced Threat Protection) protects the emails of Office 365 enterprise accounts from various threats including but not limited to credential phishing and business email compromise.

Impersonation happens when a threat actor uses a sender or domain in an email message designed to closely resemble a real sender or domain ([email protected] instead of [email protected] and ćóntoso.com instead of contoso.com).

Impersonation attacks take advantage of this tactic with the end goal of deceiving recipients that the email they just read comes from a trusted source.

Also Read: Limiting Location Data Exposure: 8 Best Practices

New impersonation detection filters

Security admins will be able to use new filters dubbed Impersonated user and Impersonated domain together with the Threat Explorer and real-time detections to detect organization users and domains targeted in impersonation attacks.

These filters add to already present capabilities that make it possible to get a list of phishing emails caught by Defender for Office 365’s existing impersonation detection filters.

“Today we provide filters for Detection Technology with User impersonation or Domain impersonation which show all Phish emails caught by our impersonation detection,” Microsoft explains.

“We are adding new filters called Impersonated user and Impersonated domain to enable Security Operations teams to explicitly hunt for specific users or domains within their organization that are targets of impersonation attacks.”

The new information will be available for security team admins via the Impersonation insight pages as well as on a newly added Email Entity page.

Microsoft Defender for Office 365 support for hunting impersonated domains and users is still currently in development.

However, Microsoft is working on making it generally available worldwide in all environments, to all Microsoft Defender for Office 365 users, by the end of February.

Impersonation protection not enabled by default

Even though Microsoft Defender for Office 365 comes with built-in anti-phishing protection, impersonation protection is not configured or enabled in the default policy.

To take advantage of the new capabilities, admins have to also enable impersonation protection features by modifying the default anti-phishing policies settings.

Later this month, Microsoft will also start to notify users of Microsoft Defender for Office 365 of suspected nation-state hacking activity detected within their tenants.

Also Read: 10 Practical Benefits of Managed IT Services

The company also added priority protection for accounts of high-profile employees including executive-level managers who are frequently targeted in attacks.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us