Trend Micro Inc.

27/08/2024 | News release | Distributed by Public on 27/08/2024 14:37

Complete Guide to Protecting Seven Attack Vectors

In addition, email-based attacks will get progressively harder to detect due to generative AI (GenAI) which can allow an adversary to craft phishing and business email compromise (BEC) messages in very realistic and enticing ways-and in any language. This further expands the pool of potential phishing targets.

What enterprises can do

Go beyond native email security by choosing a vendor with layered defense via the following technologies:

1. An email gateway, leveraging AI, ML, behavioral analysis, and authorship analysis;

2. Cloud application security broker (CASB)technology, analyzing inbox emails via the scanning of links, attachments, and messages between peers to prevent compromised accounts from phishing other employees;

3. A secure web gateway (SWG), providing additional protection if a malicious link is clicked by inspecting traffic inline, performing image analysis, and using ML to analyze branded elements, login forms, and other site content to recognize fake websites;

4. User education via built-in security awareness simulations and training where, ideally, the vendor will offer phishing tests based on templates extracted from recent, real phishing scams

2. Web and web applications

The risks

Cross-site scripting (XSS) attacks take advantage of coding flaws on websites or web applications to generate input from users. It's no wonder why XSS remains a mainstay on the Open Web Application Security Project (OWASP) Top 10 Web Application Security Risks -a severe XSS vulnerability in Ivory Search, a WordPress search plugin, left 60,000 websites open to malicious code injection. With remote work and the shift to cloud services resulting in a boom of websites and applications, enterprises need to strengthen their defense for this initial attack vector.