Read, Replied, Compromised: Data Reveals 44% Engagement Rate with VEC Attacks

Cybercriminals don’t need to breach your systems to defraud your organization. Sometimes, all it takes is a convincing email from a familiar name.
Vendor email compromise (VEC) attacks exploit the inherent confidence organizations place in their external partners, with devastating effectiveness. By impersonating trusted external partners rather than internal colleagues, these attacks exploit relationship-based vulnerabilities that traditional security training often overlooks.
In our latest threat report, Abnormal researchers reveal alarming engagement patterns that show VEC attacks are systematically deceiving employees across industries. Drawing from data across 1,400+ organizations, the report exposes a critical gap in traditional cybersecurity defenses.

Download the report to uncover the risks posed by these sophisticated threats. Findings include:
44.2% overall employee engagement rate with read VEC messages across all organizations
$300 million in attempted vendor fraud during the observation period
98.5% of text-based advanced attacks went unreported by employees
Fill out the form to get your copy today.

After viewing this resource, you are eligible for 1 CPE credit through ISC2.