S E C U R I T Y
S O L U T I O N S
S E C U R I T Y
S O L U T I O N S
J2 SOFTWARE AND SLASHNEXT HIGHLIGHT AI ’ S ROLE IN COMBATING BEC AND ADVANCED PHISHING ATTACKS
J2 Software , in partnership with SlashNext , has hosted a webinar focused on the growing threat of Business Email Compromise ( BEC ) and advanced phishing attacks .
The webinar shed light on how AI-driven solutions are transforming cybersecurity , offering proactive protection against evolving cyberthreats .
Cyberattacks now occur every 11 seconds , and by 2025 , cybercrime is projected to exceed US $ 10 trillion annually . Email remains the primary vector for these attacks , with 85 %– 93 % of successful cyberattacks starting in email , often tricking users to use other communication channels , such as mobile messaging platforms or moving them onto an online platform with their browser in an effort to bypass traditional email security measures .
Notably , small and medium-sized businesses ( SMBs ) are often targeted as they appear to be particularly vulnerable .
John McLoughlin , CEO of J2 Software , emphasised that modern cyberthreats target the essential pillars of digital operations – users , email , data , devices and Internet infrastructure . His mantra , ‘ You can ’ t protect what you can ’ t see ’, underscores the importance of visibility for effective response .
Generative AI and large language models ( LLMs ) are revolutionising phishing attacks , as cybercriminals exploit tools like ChatGPT to craft highly localised and sophisticated phishing emails .
McLoughlin highlighted a specific incident where deepfake technology was used to impersonate a company executive via a video call , causing a multinational company to lose US $ 25 million . In this sophisticated scam , fraudsters employed deepfake technology to replicate the voice and face of the company ’ s chief financial officer , and other executives , during a video conference .
“ The employee , believing he was interacting with genuine colleagues , was tricked into transferring the substantial sum . This case is a prime example of how AI can be maliciously leveraged in social engineering attacks , where attackers craft scenarios to deceive individuals by mimicking trusted entities in virtual settings ,” he explained .
This incident underscores the growing threat of deepfake phishing schemes , where the manipulation of audio and video can bypass traditional security measures and personal scepticism . This also proves that cybersecurity is enabled by technology , but there is still a need for robust processes that live outside of the screen .
Companies like SlashNext offer a 360-degree protection suite that goes beyond traditional Secure Email Gateways ( SEGs ), which struggle against modern threats .
Addressing mobile threats and smishing
Mobile devices have become prime targets for phishing via SMS ( smishing ). SlashNext ’ s mobile app , designed for both personal and BYOD ( Bring Your Own Device ) environments , filters malicious messages directly on the device . This ensures privacy and security without reporting back to external systems .
A notable example discussed was the Twilio breach , where attackers mimicked Twilio ’ s Single Sign-On ( SSO ) system through SMS , demonstrating the critical need for robust mobile defences . � www . intelligentfin . tech
53