Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

MEMBER
Thamer Noori
Director of Industrial Security and Safety Dept.
35
EXECUTIVE MEMBER
Rafal Jarosz
Managing Partner
93
MEMBER
Ayaz Khan
Manager operation
0
MEMBER
Alanoud Alaswad
Passenger Experience Specialists
14
MEMBER
Ilse Hess
Director, Talent Acquisition & Organizational Development
374

News : Response-Based Email Threats Targeting Corporate Inboxes Are The Highest Since 2020, According To HelpSystems

#contactcenterworld

Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the HelpSystems cybersecurity portfolio.

From April through June, researchers at Agari and PhishLabs analyzed hundreds of thousands of phishing and social media attacks targeting enterprises and their employees. The report uses the data from those attacks to present key trends shaping the threat landscape.

A response-based threat is a social-engineering attack that relies on victims responding through a chosen channel of communication, and comprises methods such as phishing (targeting victims over email), vishing/smishing (over a voice call or an SMS text message) and advance-fee fraud where victims are tricked into sending an upfront-fee in exchange for a larger sum of money – also known as a 419 or Nigerian scam.

According to the report, advance-fee scams represented 54 percent of all response-based email threats in Q2. This threat type has seen a 3.4 percent increase in share of reports so far in 2022, and routinely occupies the majority of response-based attacks. Business Email Compromise (BEC), where threat actors pose as a trusted source, such as a company employee or third-party contractor, also experienced an increase in Q2, contributing to 16 percent of overall attack volume. And while the share of attacks was down from Q1 among other threats within the response-based category, hybrid vishing (email-initiated voice phishing) attacks also increased by volume, reaching a six-quarter high in Q2, increasing 625% in volume from Q1 2021.

"Response-based attacks consistently represent a significant portion of phishing volume, which highlights the fact that social engineering tactics continue to prove effective for criminals," said John Wilson, Senior Fellow, Threat Research at HelpSystems. "We’ve seen threat actors continue to adapt 419, vishing, and BEC lures, so it is clear that most threat actors aren’t reinventing the wheel, but instead relying on new variants of the same socially engineered threats that have proven successful in the past."

Additional Key Findings

  • Phishing is steadily on the rise. Attacks are up nearly six percent in Q2 from Q1 2022.

  • In Q2, social media attacks increased 20 percent from Q1, averaging nearly 95 attacks per enterprise, per month. This represents a more than 100 percent increase in attacks in the last 12 months, as social platforms represent the most accessible tools capable of scamming the largest pool of victims.

  • In Q2, the Emotet trojan officially regained its status as the top payload after increasing 30 percent to represent nearly half of all malware attacks. Notably, newcomer Bumblebee jumped from unknown to the third spot, and is thought to be linked to former preferred payloads Trickbot and BazaLoader.

  • Credential theft attacks targeting Office 365 accounts reached a six-quarter high in share and volume during Q2. More than 58 percent of all credential theft phishing links were delivered with the intent to steal O365 login credentials, up 17.7 percent for the year.

"While most reported emails are typically not malicious, the proactive identification and reporting of suspicious emails is critical to keeping enterprises secure from credential theft, response-based, and malware attacks. Going forward, security teams should counteract the attack footprint by investing in cross-channel monitoring and partnerships with technology providers where abuse may occur," concludes Wilson.

#contactcenterworld


Today's Tip of the Day - Monitor All Channels

Read today's tip or listen to it on podcast.

Published: Monday, August 15, 2022

Printer Friendly Version Printer friendly version

2024 Buyers Guide Automation

 
1.) 
Call Adapt

Soundboard Software
Call Adapt is a cloud-based digital soundboard application designed for contact centers. It works with any type of call and integrates with your existing dialer system. Powered by smart audio technology, Call Adapt gives your agents the ability to converse with customers in real time using programmed keyboard shortcuts. The result is perfect pitch delivery and less time spent on repetitive tasks.

2.) 
eGain Corporation

eGain Solve
Proven, Easy, and Guided Journey to Automate Customer Engagement in a Digital+AI World

3.) 
Pointel

Genesys Identity and Access Manager
Automated Provisioning Solution for Multi-Vendor Communication Platforms

Managing agent profile data across multiple systems is a big challenge for contact centers. The manual tasks of agent provisioning, decommissioning, daily change exercises, skill level synchronization, license recovery and detailed reports on usage are tedious, time-consuming, and often expensive for businesses.

Managing ID and access within a contact center is further complicated by profile information and requirements that vary from application to application. Automating the processes of onboarding and off-boarding in contact centers helps overcome these challenges and enhances agents’ productivity.

Pointel I...
(read more)
 

About us - in 60 seconds!

Submit Event

Upcoming Events

The 19th AMERICAS Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
 33991 
Showing 1 - 1 of 3 items

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Industry Champion Award Leaderboard

Most active award entrants in the past 48 hours! - Vote for Others / About Program
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed = True
session blnCompletedAwardInterestPopup = False
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =