WEBINAR | From Deal to Defense: Unifying Cybersecurity Post-M&A
Reduce Alert Noise and False Positives
Boost your team's productivity by cutting down alert noise and false positives.
Automate Security Operations
Boost efficiency, reduce burnout, and better manage risk through automation.
Dark Web Monitoring
Online protection tuned to the need of your business.
Maximize Existing Security Investments
Improve efficiencies from existing investments in security tools.
Move your security operations beyond the limitations of MDR.
Secure with Microsoft 365 E5
Boost the power of Microsoft 365 E5 security.
Secure Multi-Cloud Environments
Improve cloud security and overcome complexity across multi-cloud environments.
Secure Mergers and Acquisitions
Control cyber risk for business acquisitions and dispersed business units.
Solve security operations challenges affecting critical operational technology (OT) infrastructure.
Force-Multiply Your Security Operations
Whether you’re just starting your security journey, need to up your game, or you’re not happy with an existing service, we can help you to achieve your security goals.
Detection Investigation Response
Modernize Detection, Investigation, Response with a Security Operations Platform.
Locate and eliminate lurking threats with ReliaQuest GreyMatter
Find cyber threats that have evaded your defenses.
Security metrics to manage and improve security operations.
Breach and Attack Simulation
GreyMatter Verify is ReliaQuest’s automated breach and attack simulation capability.
Digital Risk Protection
Continuous monitoring of open, deep, and dark web sources to identify threats.
GreyMatter Phishing Analyzer removes the abuse mailbox management by automating the DIR process for you.
The GreyMatter cloud-native Open XDR platform integrates with a fast-growing number of market-leading technologies.
Unify and Optimize Your Security Operations
ReliaQuest GreyMatter is a security operations platform built on an open XDR architecture and designed to help security teams increase visibility, reduce complexity, and manage risk across their security tools, including on-premises, clouds, networks, and endpoints.
Brands of the world trust ReliaQuest to achieve their security goals.
Learn how to achieve your security outcomes faster with ReliaQuest GreyMatter.
The latest security trends and perspectives to help inform your security operations.
Industry Guides and Reports
The latest security research and industry reports.
Catch up on the latest cybersecurity podcasts, and mindset moments from our very own mental performance coaches.
A deep dive on how ReliaQuest GreyMatter addresses security challenges.
The latest white papers focused on security operations strategy, technology & insight.
Current and future SOC trends presented by our security experts.
Events & Webinars
Explore all upcoming company events, in-person and on-demand webinars
From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security posture.
Get the latest threat analysis from the ReliaQuest Threat Research Team. ReliaQuest ShadowTalk Weekly podcast featuring discussions on the latest cybersecurity news and threat research.
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories.
February 20, 2024
We bring our best attitude, energy and effort to everything we do, every day, to make security possible.
Security is a team sport.
No Show Dogs Podcast
Mental Performance Coaches Derin McMains and Dr. Nicole Detling interview world-class performers across multiple industries.
Make It Possible
Make It Possible reflects our focus on bringing cybersecurity awareness to our communities and enabling the next generation of cybersecurity professionals.
Join our world-class team.
Press and Media Coverage
ReliaQuest newsroom covering the latest press release and media coverage.
Become a Channel Partner
When you partner with ReliaQuest, you help deliver world-class cybersecurity solutions.
How can we help you?
A Mindset Like No Other in the Industry
Many companies tout their cultures; at ReliaQuest, we share a mindset. We focus on four values every day to make security possible: being accountable, helpful, adaptable, and focused. These values drive development of our platform, relationships with our customers and partners, and further the ReliaQuest promise of security confidence across our customers and our own teams.
Adversaries are developing new ways of attacking you using old forms of communication. Make sure your communication of this issue is equally as effective.
Social engineering is a term that covers a broad spectrum of malicious activity and tactics to “exploit the human”. Often this involves tricking them into divulging information or performing tasks that assist an attacker. In recent incidents, we noted the use of phone calls as a pre-requisite to a cyber-attack but how are attackers increasingly using this tactic?
In one recent incident, UK-based educational institutions were warned of a campaign targeting them with ransomware. The attack was initiated by a cold-caller purportedly from the ‘Department of Education’ (rather than the Department for Education) requesting the email address of a senior employee, usually the head teacher. The caller alleged that they had sensitive documents which needed to be sent to the individual rather than a generic inbox. The victim was then targeted with a phishing email containing a malicious attachment seeking to infect them with ransomware.
In another example, the organized criminal group Carbanak (aka Anunak) also used phone calls as part of their tactics. They reportedly targeted multiple companies in the hospitality sector with malware, potentially to harvest bank card information from point of sale devices. This involved phoning the company claiming to be unable to access an online reservation, emailing them a fraudulent reservation document, and staying on the call whilst the recipient opened the document and inadvertently infected their system with information harvesting malware.
Similarly “technical support scams” are another popular tactic whereby users receive calls from a phony tech support or “Windows Support Centre” offering to remove a virus or resolve an imaginary technical problem. Some offer to do this for a fee; others appear more altruistic. The victim is directed to install software which would grant the threat actor remote access to their system, following which a variety of malicious acts are undertaken including malware infection and data theft. TalkTalk customers were warned of these kinds of scams after a customer data breach in October 2015.
As education and awareness grows regarding the threats of malicious emails and suspicious documents, the addition of the phone-call introduces a new and personalized aspect to the scam. It highlights the efforts to which some threat actors will go, as well as the creativity involved. Accessing the necessary contact telephone numbers is relatively simple. Companies and organizations often publicize a general enquiry number, and the actors then rely on deceiving staff and employees to divulge employee personal contact details. Public directories have long been used by fraudsters for cold-calling, a tactic which has simply been adopted by cyber threat criminals as well. Below is a table highlighting the Strengths, Weaknesses, Opportunities and Threats (SWOT) of this particular scam. SWOT is an effective tool providing both a current view of the threat from the attacker’s point of view, and also an element of forecasting.
Fig 1: A SWOT of the cold-calling tactic
Along with efforts to educate employees on the associated risks, another line of defence is for companies to use call answering services, which can help to triage out potential malicious calls. The advice is to treat all unsolicited calls with scepticism and suspicion, do not provide personal or financial information to the caller, and certainly do not agree to install software on to your device unless you are confident of its purpose. As with all scams, it’s better to be safe than sorry.
Organizations affected by data breaches, which then may expose customers or employees to these kinds of approaches are advised to develop “playbooks” of how to respond in the event of such incidents happening. This might include the reissue of credentials where possible and the provision of appropriate guidance and awareness to those individuals affected.