Sponsor of the Day:
Jerkmate
https://www.infosecurity-magazine.com/news/bec-attacks-expand-toward-mobile/
BEC Attacks Expand Beyond Email and Toward Mobile Devices - Infosecurity Magazine
Nov 6, 2025 - Scammers typically obtain mobile numbers from data breaches, social media and data brokers
bec attacksexpand beyondmobile devicesinfosecurity magazineemail
https://www.huntress.com/use-cases/business-email-compromise
Business Email Compromise Protection: Stop BEC Attacks Fast | Huntress
Prevent business email compromise with 24/7 identity monitoring and SOC-backed response. Huntress helps detect account takeover, suspicious activity, and...
business email compromiseprotection stopbec attacksfasthuntress
https://www.mimecast.com/content/business-email-compromise/
Business Email Compromise: How BEC Attacks Work | Mimecast
Business email compromise uses impersonation to steal money or data through email. Learn how to detect and stop BEC attacks—get started today.
business email compromisebec attackswork mimecast
https://redsift.com/how-to-protect-organizations-against-business-email-compromise-phishing
Download Gartner® Report on Business Email Compromise (BEC) Attacks | Red Sift
Explore how to defend your organization from BEC phishing attacks with proven email security strategies. Learn best practices, risk factors, and solutions to...
business email compromisebec attacksred siftdownloadreport
https://threatpost.com/bec-attacks-nigeria-losses-snowball/160118/
BEC Attacks: Nigeria No Longer the Epicenter as Losses Top $26B | Threatpost
Oct 14, 2020 - BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually — and growing.
bec attackslosses topnigerialongerepicenter
https://gurucul.com/blog/breaking-the-blind-spot-detecting-data-exfiltration-via-disposable-emails-in-bec-attacks/
Detecting Disposable Email Exfiltration in BEC Attacks
Apr 6, 2026 - Detect disposable email exfiltration in BEC attacks and learn how attackers bypass controls using temporary domains for stealth data theft.
disposable emailbec attacksdetectingexfiltration
https://thehackernews.com/2022/05/interpol-arrest-leader-of-silverterrier.html
Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks
Interpol has arrested the leader of the SilverTerrier cybercrime syndicate, which was responsible for mass phishing attacks and BEC attacks.
bec attacksinterpolarrestsleadercybercrime
https://www.computerweekly.com/news/366637242/Dual-channel-attacks-are-the-new-face-of-BEC-in-2026
‘Dual-channel’ attacks are the new face of BEC in 2026 | Computer Weekly
Business email compromise remains a significant threat as cyber fraudsters deploy a more diverse range of tactics against their potential victims, according to...
2026 computer weeklynew faceattacksbec
https://www.todyl.com/solutions/identity-threat-detection-response
Stop BEC and Other Attacks | Identity Threat Detection and Response | Todyl
ITDR is one of the best defenses against BEC and other identity-driven attacks. Use Todyl to identify signs of compromise and prevent breaches.
identity threat detectionstopbecattacksresponse
https://www.sans.org/webcasts/when-trusted-senders-become-threats-stopping-bec-supply-chain-attacks-selflearning-ai
When Trusted Senders Become Threats: Stopping BEC and Supply Chain Attacks with Self‑Learning AI |...
Your biggest email threats aren’t strangers, they’re trusted partners whose accounts have been compromised. Discover how self‑learning AI uncovers subtle...
supply chain attackstrustedsendersbecomethreats