StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces
好的,我需要帮用户总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得通读整篇文章,抓住主要观点。 文章主要讲的是网络安全的复兴,提到传统防病毒到AI再到光子计算和量子加密。然后介绍StrongestLayer公司的报告,分析了2042次邮件攻击,这些攻击绕过了微软和知名邮件网关。攻击者利用可信品牌如DocuSign、微软日历等隐藏自己,不再依赖恶意软件或钓鱼技术,而是利用信任和认证漏洞。 报告指出77%的攻击未能通过SPF、DKIM或DMARC认证却仍进入收件箱,100%绕过了现有安全措施。45%的攻击显示AI协助迹象,预计未来会增加到75-95%。此外,Google日历攻击通过API绕过邮件网关,成为盲点。传统检测依赖模式识别,而AI生成的钓鱼攻击相似度低至12-18%,导致模式匹配失效。 总结起来,文章强调了现代网络威胁的新趋势:利用可信品牌、隐藏在正常业务流程中,并借助AI技术绕过传统安全措施。防御需要结合威胁信号和业务合法性信号。 现在我要把这些要点浓缩到100字以内。确保涵盖网络安全复兴、StrongestLayer的报告、攻击手法变化、AI的影响以及防御建议。 </think> 网络安全领域正经历一场复兴,从传统防病毒到网络级控制、AI再到光子计算和量子加密。StrongestLayer报告分析了2042次邮件攻击,揭示攻击者利用可信品牌如DocuSign、微软日历等隐藏行为,绕过现有安全措施。77%的攻击未能通过认证却仍进入收件箱,100%绕过微软E3/E5和邮件网关。45%的攻击显示AI协助迹象。传统检测依赖模式识别已失效,需结合威胁信号和业务合法性信号进行防御。 2026-2-2 07:0:28 Author: securityboulevard.com(查看原文) 阅读量:0 收藏

There’s something of a renaissance happening in cybersecurity. No, it never went away, you’re right, but the level of vocal engagement coming out of every enterprise software vendor in this space now spans traditional anti-virus protection to network-level robustness controls and onward to (obviously) agentic AI lifecycles… and then leaps forward to the next era of optical photonics-based computing and, of course, quantum encryption.

Working in the here and now with a self-imposed remit to protect the most pressing cyber vulnerabilities is StrongestLayer. The company’s new threat intelligence report (jauntily named What Your Email Security Can’t See) is based on an analysis of 2,042 advanced email attacks that successfully bypassed Microsoft Defender E3/E5 and well-known secure email gateways before being detected. 

Quick, Hide Behind the Platform

The findings may point to a shift in attacker behavior, where adversaries increasingly hide behind well-known platforms such as DocuSign, Microsoft and Google Calendar, which are all services that organizations typically cannot block without disrupting operations.

Rather than relying on malware or obvious phishing techniques, today’s attackers exploit trust, authentication gaps, and operational dependency. The report provides rare visibility into the techniques that define modern email threats by examining only attacks that incumbent security controls missed.

“Email security has reached an inflection point,” said Alan LeFort, CEO and co-founder, StrongestLayer. “The controls enterprises depend on were designed to detect patterns and known bad signals. But attackers are now exploiting trusted brands and legitimate infrastructure, areas that those systems were never built to reason about.”

The company says that 77% of attacks failed Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), or Domain-based Message Authentication, Reporting, and Conformance (DMARC) authentication yet still reached inboxes, exposing a widespread enforcement gap. 100% of threats bypassed incumbent email security, including Microsoft E3/E5 and leading secure email gateways. Approximately 45% of attacks showed indicators of AI assistance, a figure projected to rise to 75–95% within the next 18 months

Trusted Brands, New Attack Surface

The report thinks that attackers are no longer trying to look legitimate – they are hiding behind platforms that already are. DocuSign alone accounted for more than one-fifth of all attacks analyzed, particularly targeting legal, financial and healthcare organizations where document-signing workflows are deeply embedded in daily operations.

Google Calendar attacks represent an especially concerning trend. Because calendar invitations are delivered via calendar APIs rather than email, these attacks bypass secure email gateways entirely, creating a blind spot for most security teams.

The Authentication Challenge

Email authentication is widely promoted as the solution to impersonation attacks, yet the data tells a more complex story. Most organizations maintain permissive DMARC policies to avoid blocking legitimate but misconfigured senders. Attackers knowingly exploit this reality, delivering messages that fail authentication but are still allowed through.

“StrongestLayer’s analysis shows AI-assisted phishing has fundamentally changed the economics of detection. Traditional phishing campaigns reuse templates with high similarity, allowing pattern-based systems to work. AI-generated attacks, however, share as little as 12–18% similarity across variants, rendering pattern matching mathematically ineffective – a phenomenon [our] report calls the Pattern-Matching Cliff. As AI-generated attacks become the default, organizations relying solely on pattern-based detection face a rapidly narrowing window to adapt,” explains LeFort and team

The attacks in this report share a common trait: they don’t look malicious in isolation. Legacy systems operate as “prosecutor-only” architectures, searching for evidence of guilt such as malicious links or known-bad indicators. What they lack is the ability to prove legitimacy – whether a DocuSign notification aligns with real business activity or a calendar invite reflects an authentic workflow.

Defending against trust-exploitation attacks requires a dual-evidence approach that evaluates both threat signals and business legitimacy signals, enabling confident decisions without the false-positive burden that plagues traditional tools.

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/02/strongestlayer-top-trusted-platforms-are-key-attack-surfaces/
如有侵权请联系:admin#unsafe.sh