Skip to main content
New Advanced Threat Defense now includes AI-powered URL analysis Learn more → →
Tag

Phishing Awareness

160 articles

Foundational 6 min

Cloud-Based Strategies For The Prevention Of Phishing Across Your Organization

Modern phishing scams exploit cloud identity, email, and SaaS expansion at scale.

Foundational 8 min

How To Enable Anti-Phishing On Android: Settings, Tips, And Built-In Protections

Phishing attacks targeting Android devices have evolved, using tactics that reach users via text messages, email, web browsers.

Foundational 12 min

Phishing Prevention Best Practices: 2026 Guide To Identify And Avoid Scams

Phishing prevention in 2026 demands renewed security awareness because adversaries blend social engineering with generative AI to industrialize online fraud.

Foundational 19 min

No-Cost Anti-Phishing Tools And Services: How To Secure Your Organization For Free

Phishing attacks persist because social engineering reliably exploits human trust, brand familiarity, and urgency.

Foundational 6 min

Best AI Anti‑phishing Email Security Solutions For 2026

The phishing ecosystem has shifted from opportunistic spam to targeted, multi‑channel email attacks driven by generative AI and criminal marketplaces.

Foundational 18 min

Spear Phishing Vs. Pretexting: How Targeted Emails Exploit Trust - And How To Stop Them

Targeted attack campaigns increasingly arrive as well-crafted emails that look routine but are engineered to mislead.

Foundational 14 min

12 Real-World Spear Phishing Examples And The Red Flags You Missed

Spear phishing succeeds because it blends social engineering with business realism.

Foundational 10 min

What Is Phishing Email Analysis? Definition, Methods, And Best Practices

Phishing email analysis is the systematic examination of suspicious messages to identify, validate, and contain phishing attacks before they lead to compromise.

Foundational 10 min

Zero-Day Attack Prevention For Businesses: Proactive Measures That Work

A zero-day attack occurs when threat actors exploit a previously unknown vulnerability in software, hardware.

Foundational 12 min

Phishing Protection Services: Assessments, Strategies & Top Providers Explained

Phishing attacks have evolved into one of the affecting businesses and individuals.

Foundational 11 min

Stop Spear Phishing Before It Starts: Key Warning Signs & Solutions

Spear phishing remains one of the most sophisticated and damaging forms of cyber threats facing organizations and individuals today.

Foundational 11 min

Email Phishing Protection: Essential Strategies To Safeguard Your Inbox

Phishing emails remain the most prevalent vehicle used by cybercriminals to compromise both consumer and enterprise accounts.

Foundational 12 min

Protect Yourself From Phishing: What Everyone Needs To Know

At its core, a phishing attack is a form of cybercrime where scammers masquerade as trustworthy entities to manipulate individuals into revealing sensitive.

Foundational 11 min

How Anti-Phishing Services Defend Against Email Threats And Impersonation

Phishing attacks continue to top the list of email threat types, exploiting human error, social engineering, and technical vulnerabilities.

Foundational 12 min

Office 365 Security: Best Practices To Prevent Phishing Emails

Phishing continues to be the leading attack vector against today’s cloud organizations, exploiting the trust of users to achieve credential theft.

Foundational 12 min

Anti-Phishing Protection Is Non-Functional: Common Causes & Solutions

Anti-phishing protection is a critical feature integrated into modern security suites, email platforms, and dedicated gateway solutions.

Foundational 15 min

Phishing Attacks Demystified: Comprehensive Guide To Spear Phishing Defense

Spear phishing represents one of the most sophisticated and targeted forms of phishing attacks in the cybersecurity landscape.

Foundational 11 min

Anti-Phishing Security Explained: Tools And Techniques To Stay Safe

Phishing remains one of the most pervasive cyber threats today, as cybercriminals continually refine their tactics to trick individuals and organizations into.

Foundational 9 min

How To Recognize And Avoid Phishing Scams: A Complete Guide

Phishing attacks represent one of the most pervasive threats in modern cybersecurity.

Foundational 4 min

Cybersecurity Awareness Month: How To Stay Safe Online In 2025!

Cybersecurity Awareness Month: How To Stay Safe Online In 2025! https://www.phishprotection.

Foundational 8 min

Phishing Defense Strategies: Choosing The Right Anti-Phishing Service Provider

Phishing represents one of the most pervasive and damaging cyber attack vectors today, targeting individuals and organizations alike to steal sensitive data.

Foundational 4 min

AI-backed voice cloning may lead to vishing attacks!

  A group of researchers believes that AI-based voice impersonation can enhance social engineering tactics and make them sound more perfect and convincing.

Foundational 8 min

Understanding Automated Anti-Phishing Techniques For Enhanced Security

Phishing is a sophisticated form of cyberattack where malicious actors attempt to deceive individuals into divulging sensitive information such as login.

Foundational 4 min

Social Media Scams and What Every User Should Know in 2025

Social media has become intricately woven into our everyday lives.

Foundational 9 min

Recognizing Fake Emails From CEOs: What You Need To Know

In today’s digital communication landscape, leadership communication via email is central to corporate operations.

Foundational 4 min

Beware of Phantom Hacker Scams: Warns FBI

Beware of Phantom Hacker Scams: Warns FBI https://media.mailhop.org/phishprotection/images/2025/09/Beware-of-Phantom-Hacker-Scams-Warns-FBI.

Foundational 5 min

How Medical Misinformation Fuels Email Scams and Puts Lives at Risk

In our hyper-connected world, the rapid spread of information has become a double-edged sword.

Foundational 9 min

Top 10 Best Anti-Phishing Solutions To Protect Your Business In 2025

As cyber threats evolve, phishing attacks continue to be one of the most pervasive and damaging types of cybercrime targeting businesses worldwide.

Foundational 4 min

How to Secure Your Website and Protect Against Phishing Attacks

Phishing attacks and web application threats are hitting more sites every year.

Foundational 23 min

Anatomy of a Trust-Based Attack: Deconstructing the Nifty.com Phishing Campaign and the New Frontier of Corporate Defense

1. Fortify the "Human Firewall" (Highest Priority) This is the most critical and cost-effective area.

Foundational 4 min

Fake customer care service scam may cost you your fortune!

Fake customer care service scam may cost you your fortune! https://www.phishprotection.

Foundational 4 min

Understanding Traffic Distribution System (TDS) and the associated cyber risks!

The Traffic Distribution System (TDS) has been around for many years now.

Foundational 4 min

Australian woman lost $780,000 in search of love online!

  An Australian woman lost a whopping $780,000 and is currently living a homeless life. All these happened just because she was searching for love online!

Foundational 4 min

TikTok gets banned and then restored within a few hours in the US!

Every TikTok user right now is considering themselves as God’s favorite child.

Foundational 4 min

Threat actors target a popular donut company in the US!

Donut lovers, this news may be a cause of concern for you all. The donut company Krispy Kreme faced a incident last month.

Foundational 2 min

8 million Android users fell prey to SpyLoan malware on Google Play Store

  Android users, do you think apps that you download from the Google Play Store are completely secure and harmless?

Foundational 3 min

ByteDance- the parent company to TikTok to wind up in Canada

On November 7, Canada finally joined the

Foundational 4 min

Indian Woman loses around $1035 after downloading lounge app at Bengaluru airport!

Are you planning to enjoy the airport lounge facility while you wait for your next flight? 

Foundational 4 min

Beware of Vacation Cyber Frauds These Summer Holidays

Are you all set to enjoy your summer holidays? Can’t wait to go out and finally enjoy your time off along a dreamy beachside?

Foundational 2 min

Spike in Tax Phishing Scams: SMBs and Self-Employed Under Siege!

Social Security Numbers are of paramount significance and help establish identity in a more proficient way.

Foundational 3 min

Developing An Anti-Phishing Strategy For Businesses: A Thorough Guide

Even though businesses are bracing up for cyberattacks by embracing advanced security measures.

Foundational 2 min

Cyber Crimes Intensify In The Holy Month Of Ramadan: Know The Whys and Hows! 

Ramadan, the ninth month of the Islamic calendar, is a time frame when the Muslim community practices fasting, works towards spiritual development.

Foundational 4 min

Phishing v/s Smishing v/s Vishing- The 3 Notorious Cyber Attacks You Must Be Aware of!

Cybercrime instances have been increasing at an exponential rate in the past couple of decades.

Foundational 2 min

Microsoft 365 Being a Soft Target for Scammers- Email Do’s and Don’ts You Need to Keep In Mind!

Microsoft, the software giant, has time and again been exposed to top picks among phishing actors .

Foundational 2 min

Screensharing Fraud: Latest Favorite Among Phishing Actors!

Threat actors have time and again proved their agility when it comes to devising new phishing tactics.

Foundational 4 min

Scam Alert- Decoding the Rise of WhatsApp Phishing Scams!

WhatsApp, one of the most popular messaging apps, has once again become the target for phishing experts.

Foundational 3 min

LinkedIn Smart Links are Getting Abused Again

LinkedIn, one of the biggest professional networking and personal branding platforms, has once again become the center of attraction.

Foundational 3 min

A Mariott Hotel Guest Got Scammed In the Name of Discounted Rates!

The dream to relax and rejuvenate in a Mexican boutique hotel soon turned into a nightmarish experience for a traveler when they got scammed in the name of.

Foundational 5 min

How to Send Automatic Emails in Outlook?

In today's fast-paced business landscape, where time is a precious commodity.

Foundational 3 min

Navigating the Unseen: Accessing Your iPhone’s Spam Text Messages Folder

With the introduction of instant messaging apps like WhatsApp, Instagram, TextNow, and Messenger, the use of text messages has gone down, but not as much.

Foundational 4 min

Why is Phishing Awareness Training Important For Employees?

As cyber threats evolve, phishing remains a persistent and increasingly potent threat to organizations and individuals.

Foundational 3 min

How to Defend Against Voice Phishing

  Vishing, or voice phishing, can appear in various garbs, and strict adherence to cybersecurity best practices is required for its prevention.

Foundational 4 min

What is a Zero Transfer Phishing Scam?

Zero transfer phishing scams are among the latest attack vectors in the cyber threat landscape and have already started to stir the cryptocurrency realm.

Foundational 4 min

Sorillus Remote Access Tool and Phishing Attacks Exploit Google Firebase Hosting Abilities

Malicious actors have become more innovative by exploiting Google Firebase Hosting service to launch Sorillus RAT and phishing attacks on unsuspecting networks.

Foundational 3 min

Stay Alert During Amazon Prime Day: Threat Actors Set Up Scams Targeting Shoppers

With the Amazon Prime Day shopping event driving shoppers crazy, malicious actors have already set shopping traps to exploit unsuspecting buyers.

Foundational 4 min

Strengthening Phishing Protection: An Exploration of a Multi-Layered Approach for Enhanced Security

  This text shares a multi-layered approach to email phishing protection and showcases what organizations need for robust phishing protection.

Foundational 3 min

New DoubleFinger Malware Threatens Crypto Wallets with Advanced Multi-Stage Attack

With cryptocurrencies soaring in value and popularity, crypto wallets have been a lucrative target of malicious actors.

Foundational 3 min

Massive Phishing Campaign Ongoing for a Year Impersonates 100+ Renowned Brands

, adversaries have created well-structured fake websites of renowned brands and stolen customer data.

Foundational 5 min

Crypto Phishing Scams – How Can Users Stay Fully Protected?

As people increasingly move towards crypto, scams lie in wait to exploit user vulnerabilities.

Foundational 3 min

PhaaS or Phishing-as-a-Service Tool: “Greatness” Spotted in Active Circulation

A new Phishing as a Service tool dubbed "Greatness" has been discovered targeting US and global sectors with fake Microsoft 365 pages designed to steal login.

Foundational 3 min

QBot Email Attacks Have a New Trick Up Their Sleeve: Using PDF and WSF Combo to Install Malware

The new QBot email malware attacks are the latest case where threat actors use phishing, PDF, and WSF to deploy malware.

Foundational 3 min

Major QSR Owner Releases Data Breach Notification Three Months After Ransomware Attack

Yum Brands, a victim of a ransomware attack, has revealed a data breach that may have compromised sensitive information.

Intermediate 5 min

Sensitive Information at Risk as a Security Breach Hits US Marshals Service

A major security breach has recently hit the US Marshals Service, putting sensitive information at risk, according to senior law enforcement officials.

Intermediate 5 min

TELUS Launches Investigation After Potential Data Breach Leaks Source Code and Employee Info

TELUS, the Canadian telecom giant, is investigating a potential data breach after a threat actor leaked what appears to be employee data and source code.

Intermediate 5 min

GoDaddy Customers Beware: Hackers Have Been Stealing Source Code for Years

In the latest cybersecurity breach news, web hosting giant GoDaddy has revealed that malicious actors have been stealing its source code for several years.

Intermediate 5 min

Threat Actors use NameCheap’s Email to Execute Metamask and DHL Phishing Attacks.

The recent security breach and phishing campaign that occurred at Namecheap, a domain registrar.

Foundational 5 min

Threat Actors Breach Reddit and Access Internal Documents, Code, and Business Systems

Threat actors managed to infiltrate the popular social media platform Reddit and access internal documents, code, and some internal business systems.

Intermediate 5 min

Find Out About the Latest Case of Threat Actors Utilizing Phishing-as-a-Service to Steal $120,000

Threat actors made away with $120,000 from an innocent victim by duping them with a sophisticated phishing-as-a-service scam.

Intermediate 5 min

Microsoft Disables Verified Microsoft Partner Network Accounts Used In Malicious Third-Party OAuth App Campaign

The latest online status symbol is getting verified on popular platforms like Instagram, Apple AppStore, or Twitter.

Foundational 5 min

Massive Google Fi Data Breach Opens up Individuals to SIM Swapping Attacks

The Google Fi platform was breached due to one of its unsecured network providers, opening the platform's customers up to SIM-swapping attacks.

Intermediate 5 min

Threat Actors Using Malicious OneNote Attachments to Spread Malware via Phishing Emails

Threat actors have switched to a new type of file for their malicious purposes.

Intermediate 5 min

PayPal Credential Stuffing Attack: Data of nearly 35,000 Accounts at Risk

Nearly 35,000 PayPal customers were the victim of a credential stuffing attack where threat actors got access to their personal and financial information.

Foundational 5 min

The Power of ChatGPT: How ChatGPT is Changing the Phishing Game

ChatGPT is changing the phishing game for threat actors who can use it for crafting phishing emails and bypassing MFA.

Intermediate 5 min

BitRAT Malware Threat Actors Leveraging Stolen Columbian Cooperative Bank Data in Phishing Campaign

The BitRAT malware was used to target the Columbian Cooperative Bank, where the threat actors made away with records of over 400,000 individuals.

Intermediate 7 min

The Role of Employees in Your Company’s Cybersecurity Breach

Cybersecurity is no longer something for ‘other’ companies to worry about.

Intermediate 5 min

The Latest Iran-aligned Hacker Phishing Campaign Targeting Middle Eastern Countries

Iran-aligned hacker group, MuddyWater’s latest phishing campaign deploying the new Syncro remote administration tool is causing all kinds of trouble.

Intermediate 5 min

The Password Manager Giant LastPass Says Hackers Stole Customer Vault Data in a Cloud Storage Breach

If you have a LastPass account, which you use to store login information and passwords, or you previously had one that you did not delete.

Intermediate 5 min

Notable Phishing Attacks of 2022

As we enter into 2023, cybercriminals are continuing to evolve their tactics and techniques to carry out phishing attacks.

Foundational 5 min

Business Essentials: The Top Email Marketing Security Strategies for 2023

Cybercriminals are continually targeting business emails, one of the most effective marketing tools for global businesses.

Intermediate 5 min

New Schoolyard Bully Trojan Targeting Global Android Devices, Steals Facebook Logins

The Schoolyard Bully Trojan is a malware campaign that targets to get into victims' devices and steal their Facebook logins.

Intermediate 5 min

Phishing Campaign Spreading Evolved IceXLoader Malware To Exfiltrate Data

The IceXLoader malware has evolved and is striking via a phishing email, dropping the malware payload capable of advanced, evasive.

Intermediate 6 min

Cybersecurity Updates For The Week 46 of 2022

Over the past years, phishing attacks have evolved in number and intensity.

Intermediate 5 min

Robin Banks Phishing Service Back with Cookie Stealer and Russian Server

The Robin Banks PhaaS platform is back with a new Russian server and a cookie stealer to bypass 2FA and compromise organizational accounts.

Intermediate 6 min

Cybersecurity Updates For The Week 44 of 2022

Threat actors continue to target organizations worldwide to get access to their information assets.

Intermediate 5 min

As Twitter Plans To Charge Verified Users $8 Fee, Threat Actors Start Launching Phishing Campaigns Exploiting The Situation

Scammers and hackers are exploiting the confusion regarding Twitter's new CEO, Elon Musk's plans for paid blue ticks on the platform.

Intermediate 6 min

Cybersecurity Updates For The Week 43 of 2022

Traditional cybersecurity measures cannot protect organizations against today's phishing attacks as they are getting increasingly sophisticated.

Intermediate 5 min

Social Engineering Attack on Twilio Compromises Employee Accounts and Customer Data

Twilio has suffered a second attack, leading to the compromise of its former and current employee accounts and the loss of sensitive customer information.

Intermediate 6 min

Cybersecurity Updates For The Week 42 of 2022

While there are various types of data breaches, one can always attribute them to a vulnerability or a security posture gap that cybercriminals exploit to gain.

Foundational 5 min

Interserve Fined $5 Million by ICO and Why Anti-Phishing Measures are the Need of the Hour

The ICO has fined Interserve £4.4 million, which is about $5 million, due to the data breach compromising the financial and personal data of 113,000 employees.

Foundational 5 min

Everything you need to know about Phishing Attacks via Caffeine

The article dives deep into the recent investigation of the Phishing-as-a-Service (PhaaS) platform called "Caffeine.

Intermediate 5 min

United Kingdom Phishing Campaign Targets 700,000 British Residents, Employs Emails, Texts, and Whatsapp

Individuals in the United Kingdom are targeted by sophisticated phishing campaigns to target finances and personal details.

Intermediate 5 min

American Airlines Suffers Employee Email Data Breach, Personal Information at Risk

Airline giant, American Airlines released a data breach notification, informing about a data breach compromising the accounts of its employees.

Foundational 5 min

Iranian-Aligned Cybercriminal Group targets Researchers, Academics, and Journalists with Sophisticated Phishing Campaign

TA453, an Iranian-aligned cybercriminal group, is harvesting credentials by employing multi-persona impersonation.

Foundational 5 min

JuiceLedger – From Low-Key Phishing Campaigns to a Sophisticated Supply Chain Attack

Open-source software libraries become frequent targets of attackers, who view them as an attractive path to distributing malware and stealing credentials.

Foundational 5 min

0ktapus – Okta Breach Helps Attackers Launch Sophisticated Supply Chain Attacks

Organizations implement Multi-factor authentication (MFA) as an enterprise identity security tool to protect them against credential theft.

Foundational 5 min

The Recent Mailchimp Security Incident and its Impact on DigitalOcean’s Customers

This article delves into the recent Mailchimp security breach and how it affected DigitalOcean users.

Foundational 4 min

Three Conti Spinoffs With Call-back Phishing Attack Vector Intrinsically Embedded

After a split from the Conti cybercrime cartel, three autonomous threat groups have created Bazarcall.

Foundational 4 min

The QBot Malware Operators Use DLL Hijacking to Sideload Malicious Files in Windows Computers

Taking advantage of how Windows handles Dynamic Link Libraries (DLLs).

Foundational 3 min

Protect Yourself From Falling For A Scam: Phishing Prevention Tips

While technical measures to secure our personal information and devices become more sophisticated.

Foundational 3 min

CEO Fraud: How Scammers Are Impersonating Executives And How To Protect Yourself

One of the latest scams to steal your money, your identity and your confidence is CEO fraud.

Foundational 3 min

Learn How To Protect Yourself From Sophisticated Phishing Email Scams

In today’s digital age, phishing emails are one of the most common ways malware and viruses are spread.

Foundational 4 min

Be Aware of The TrickBot (Phishing) Technique That Evades High-resolution Screen Device Detection

As malicious actors develop increasingly sophisticated attack vectors, enterprises and organizations need to draw a strong line of defense against such threats.

Foundational 4 min

What is a Credential Stuffing Attack and Why Is It Paramount to Protect Your Organization from Such Phishing Attacks

Credential stuffing is a phishing attack in which threat actors use the credentials obtained from a data breach to log in to another unrelated service.

Foundational 4 min

Phishing Simulations are The Crucial Need of the Hour for Phishing Prevention and Keeping Adequate Awareness Levels

The increasing trend of cyber-attacks and the lack of adequate cyber readiness dictate that organizations should improve their security posture by alerting.

Foundational 4 min

Threat Actors Have Started Using Phishing-as-a-Service (PhaaS) – Here Is Everything You Need To Know!

Less than a month ago, Microsoft exposed a well-organized operation that provides a one-of-a-kind.

Foundational 4 min

How Machine Learning Helps in Fighting Phishing Attacks

Machine learning is one of the critical mechanisms working in tandem with Artificial Intelligence (AI).

Foundational 4 min

Microsoft 365’s New Phishing Simulation to Check Your Organization’s Email Security Posture

With threats such as ransomware, phishing emails, and malware constantly lurking in the dark.

Foundational 5 min

The Relevance of Phishing Protection for Ecommerce Businesses

Today's cyber adversaries don't merely rely on computer viruses and worms to target an individual digitally but make use of sophisticated social engineering (.

Foundational 5 min

How To Protect Your Electronic Records Against Phishing

With the fast pace of digital transformation today, businesses don’t have much choice other than doing all their transaction processing online.

Foundational 4 min

What Is Domain Phishing, And Tips To Keep Your Business’s Domain Secure From Spoofing

A study by Forbes concluded that there could be up to 3.1 billion domain spoofing emails being sent daily.

Foundational 5 min

How To Strengthen Employee Security Awareness To Combat Phishing Attacks?

In the highly digitized world, phishing attacks continue to jeopardize global organizations, targeting their employees.

Foundational 4 min

Spear Phishing- The Spooky Way to Compromise Sensitive Information

It is a well-known fact that most of us in this digital era leaves behind our track or digital footprint online.

Foundational 4 min

Understanding Phishing & Types Of Phishing

Phishing is a kind of cyber-attack that is increasingly growing in popularity among hackers due to its simplicity of use and high potential rewards should the.

Foundational 4 min

A Brief Email Security & Phishing Safety Guide – Useful for IT and Email Administrators

Though phishing has its origins in the mid-1990s, it has gained tremendous relevance today.

Foundational 5 min

Here’s What Organizations Must Do To Avoid Phishing Scams While Their Employees Continue To Work From Home

The effects of the Covid-19 Pandemic have drastically altered the way the world functions.

Foundational 3 min

Get an Insight on Various Types of Anti-Phishing Services

Cybercriminals invade into your enterprise’s information systems and figure out new ways and new vulnerabilities to execute more sophisticated phishing attacks.

Foundational 4 min

Lessons From The Past: 5 Substantial Phishing Attacks/Data Breaches Of The 21st Century

Cybercriminals use malicious social engineering techniques to extract information from unsuspecting users, to launch phishing breaches.

Foundational 4 min

Phishing Scams Smaller Businesses Must Look Out for During the Holiday Season

A Microsoft report points out that there has been a 35% rise in phishing attacks. And that was not even the holiday season.

Foundational 4 min

How Organizations Are Leveraging AI & Machine Learning To Prevent Phishing Attacks

Hackers use social engineering in text messages and emails to launch phishing attacks on unsuspecting users and persuade them to share private information such.

Foundational 4 min

A Hand-Guide To Know About Crypto Scams, Their Types And How To Avoid Them

Ecash, the brainchild of Chaum and one of the first forms of cryptocurrency, was launched as an alternative to paper money in 1983.

Foundational 2 min

The Holidays are Coming Which Means Holiday Phishing Emails are Coming too

It's that time of the year. Time for a special brand of phishing emails: holiday-themed emails.

Foundational 4 min

Understanding Business Identity Theft & What Makes Businesses Vulnerable To These Identity Thefts

Those days are long gone when thieves only targeted stealing physical assets such as physical money or expensive items.

Foundational 3 min

What Made Microsoft The Most Impersonated Brand And How Phishers Leverage Similar Bigger Brands?

The COVID-19 pandemic has caused havoc not only in our real world but also in the virtual one.

Foundational 4 min

Beware Of Phishing Scams – You Could End Up Compromising Your Vital Data

Every day, we see phishing scams happening around us.

Foundational 1 min

If You’re Retired, be Wary of This Scam

If you're a retired U.S. citizen, there's a pretty good chance you collect monthly Social Security benefits. And if you do, there's something you should know.

Foundational 2 min

In Honor of Cybersecurity Awareness Month, Here’s the Only Fact You Need to Know

Two ways to penetrate a network Cybersecurity is about keeping the bad guys out of your network.

Foundational 1 min

Stop! Don’t Watch That Video

If one of your Facebook friends sent you an email that said "Is this you?" with a link to a video, would you click on it to see if it's you?

Foundational 3 min

The Real Purpose to Phishing Awareness Training: Paranoia

It’s big business today. Training employees to defend themselves (and their organization) from phishing emails. And there’s a good reason for that.

Foundational 1 min

Phishing Scams Don’t Always Arrive by Email

When you hear the word phishing, you probably think of email.

Foundational 1 min

A Big Part of the Phishing Problem is You

The days of a hacker sitting alone at their computer screen in a dark room probing for network vulnerabilities is a thing of the past. That's too much work.

Foundational 2 min

How to Stop Spam From Ending Up in Google Calendar

A lot of people use a web-based calendar to track all of their comings and goings. It makes sense.

Foundational 2 min

The Privacy Tool Used to Phish You

With email security, it's a never ending cycle of attacks and counterattacks.

Foundational 2 min

When is a 404 Error Page not an Error Page? When it’s a Phishing Page!

If you've been on the Internet, then you've run into a 404 error page.

Foundational 2 min

Seriously - Now a Phishing Attack Can Make You Deaf

There used to be a time when the worst thing that could happen to you from a phishing attack was a financial loss.

Foundational 2 min

What to do If You’re Hit by Ransomware – Part 2

As we mentioned in Part 1, when it comes to dealing with ransomware, you basically have three choices: pay it.

Foundational 7 min

Protection From Phishing: A Growing Threat In Today’s Information Age

The rapid transformation of the cyberspace and digital technologies in recent times have necessitated changes in an enterprise’s digital architecture.

Foundational 2 min

What to do If You’re Hit by Ransomware

There's much debate going on today about what to do if your organization gets hit by ransomware. There's really only two choices: pay it or don't.

Foundational 2 min

Phishing Attacks Depend Heavily on New Top Level Domains

When the Internet first began, there were just a handful of top-level domains in use.

Foundational 1 min

A Really Dumb Way to Protect Yourself from Phishing Attacks

I have to admit, what I'm about to share with you will save you a few bucks. There are a lot of ways to protect yourself from phishing attacks.

Foundational 4 min

This Fall Season, Beware of Phishing Attacks

As the holiday season approaches and shoppers plan to spend more on online purchases buying toys, gifts, clothes, etc.

Foundational 2 min

Biggest Phishing Attack Risk: It Can’t Happen to Me

Some people just refuse to put the seatbelt on when they get in their car. An act that takes about two seconds.

Foundational 4 min

How Using Anti-Phishing Email Templates to Train Your Employees Can Help Avoid Phishing Attacks

Phishing is among the most common types of cyber-attacks that take place these days and is preferred by cyber-criminals for stealing sensitive and confidential.

Foundational 2 min

Latest Phishing Vulnerability Confirms Awareness Training is Insufficient

Phishing prevention that primarily depends on awareness training is doomed to fail.

Foundational 2 min

Inception the Movie is Now an Undetectable Phishing Method

Cyber expert James Fisher discovered a new phishing method he calls the "inception bar.

Foundational 1 min

When it Comes to Getting Phished, Game of Thrones is no Fantasy

Phish protection technology is needed more than ever for fans of the wildly popular TV show Game of Thrones.

Foundational 2 min

Instagram More Popular Than Facebook: Guess Where the Hackers are?

Willie Sutton had a famous response when asked why he robbed banks: "Because that's where the money is." Hackers seem to be following Willie's advice.

Foundational 2 min

The Only Thing Worse Than Clicking on a Malicious Link in a Phishing Email

You might think that the worst thing you can do with a phishing email is to click on the malicious link embedded within. You'd be wrong.

Foundational 2 min

Phishing Protection for SMBs: The Good News and Bad News

If you run a small or midsize business (SMB) and you're concerned with , there was a lot to read in the news last week. Let's get the bad news out of the way.

Foundational 2 min

Is this the Most Successful Business Email Compromise of All Time?

Evaldas Rimasauskas of Lithuania faces up to 30 years in prison for scamming Facebook and Google out of $122 million in a BEC scheme.

Foundational 2 min

When it Comes to Phishing Attacks Today it’s all About Mobile

If you get hit with a phishing attack today, most likely it will be your mobile device.

Foundational 2 min

Phishing Prevention Best Practices eBook is Right on the Mark

phishing prevention best practices eBook , we provide ten best practices for small and mid-size businesses. We know these practices work.

Foundational 4 min

Use Humor to Get Your Employees Serious About Phishing Awareness

For most people, phishing scams are not high on the list of potential sources of comedy.

Foundational 2 min

Why More and More Phishing Attacks are Going After Mobile Users

Phishing attacks are hard to stop because hackers are extremely sophisticated and they use every method available.

Foundational 3 min

Phishing in the News

2018's Primary Breach Actors Were Malicious Outsiders by security firm Tripwire, "2018’s primary breach actors were malicious outsiders.

Intermediate 1 min

How Keeping Up With The News Can Get You Hacked

One of the easiest ways to get hacked is through a phishing email.

Foundational 1 min

Deceptive Links Make Phishing Emails Even Harder for Users to Detect

If you've been trained to detect phishing emails, then you know it's best not to click on links in an email.

Foundational 2 min

Attack on 2 Factor Authentication Highlights Phishing Protection Needs

Two factor authentication (2FA) is supposed to make logins more secure.

Foundational 9 min

Combating the Threat of Phishing in the Modern Corporation

Phishing is possibly the single most dangerous form of cyber attack facing individuals and corporations in today’s world because it exploits people rather than.

Advanced 4 min

Can Phishing Awareness Training Cause More Harm Than Good?

Filtering and time-of-click protection can produce results where training fails.

Foundational 5 min

The Top 5 Phishing Scams in History – What You Need to Know

Learn how to protect yourself by studying the biggest phishing scams in history If we draw an analogy between phishing and fishing.