{"id":1118756,"date":"2023-10-20T06:15:07","date_gmt":"2023-10-20T10:15:07","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/how-to-protect-against-evolving-phishing-attacks-national-security-agency\/"},"modified":"2023-10-20T06:15:07","modified_gmt":"2023-10-20T10:15:07","slug":"how-to-protect-against-evolving-phishing-attacks-national-security-agency","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-to-protect-against-evolving-phishing-attacks-national-security-agency\/","title":{"rendered":"How to Protect Against Evolving Phishing Attacks &#8211; National Security Agency"},"content":{"rendered":"<p><p>      FORT MEADE, Md. - The National Security Agency (NSA) and U.S.      partners have released a       new report describing the latest techniques in phishing      attacks and the defenses organizations can deploy against      them.            The Cybersecurity Information Sheet (CSI) Phishing      Guidance: Stopping the Attack Cycle at Phase One      outlines tailored cybersecurity controls for Information      Technology (IT) departments to reduce phishing attacks, also      known as electronically delivered social engineering. The      Cybersecurity and Infrastructure Security Agency (CISA), NSA,      the Federal Bureau of Investigation (FBI), and the      Multi-State Information Sharing and Analysis Center (MS-ISAC)      co-authored the CSI.            Knowing how to navigate phishing danger is essential because      anyone can fall victim to these attacks, said Eric Chudow,      NSAs Cybersecurity System Threats & Vulnerability Analysis      Subject Matter Expert. Cyber threat actors are constantly      evolving their techniques and harnessing new technologies to      their advantage, including artificial intelligence. They are      also finding it easier to deceive people who have      transitioned to hybrid work environments and have      fewer-face-to-face interactions.            Cyber actors employ a wide range of technologies and      platforms to conduct phishing attacks. Common vectors include      short messaging system (SMS) text messages and chats in      platforms such as Slack, Teams, Signal, WhatsApp, iMessage,      and Facebook Messenger. Such attacks may lure users into      divulging their login credentials or clicking a malicious      hyperlink or attachment which then executes malware.            The CSI provides detailed mitigations to protect against      login credential phishing and malware-based phishing, as well      as steps for identifying and remediating successful phishing      activity. It lists more than a dozen best practices for IT      professionals to follow to avoid their organization being      compromised, including phishing-resistant multi-factor      authentication (MFA), phishing filters for links and      attachments, protective DNS, application allow-lists, and      remote browser isolation.            Additional guidance in the CSI focuses on software      manufacturers implementing secure by design and default      tactics and techniques. Software manufacturers should develop      and supply software that is secure against the most prevalent      phishing threats. The co-authoring agencies urge      organizations to hold software manufacturers to a      secure-by-design technology standard and build these and      other mitigations directly into products to protect users and      organizations from phishings malicious effects.                  Read the full report here.                  Read NSAs secure-by-design guidance.                  Visit our full library for more cybersecurity information      and technical guidance.    <\/p>\n<p>      NSA Media Relations      <a href=\"mailto:MediaRelations@nsa.gov\">MediaRelations@nsa.gov<\/a>      443-634-0721    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3560788\/how-to-protect-against-evolving-phishing-attacks\" title=\"How to Protect Against Evolving Phishing Attacks - National Security Agency\" rel=\"noopener\">How to Protect Against Evolving Phishing Attacks - National Security Agency<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> FORT MEADE, Md. - The National Security Agency (NSA) and U.S. partners have released a new report describing the latest techniques in phishing attacks and the defenses organizations can deploy against them <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/how-to-protect-against-evolving-phishing-attacks-national-security-agency\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1118756","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118756"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1118756"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118756\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1118756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1118756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1118756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}