Skip to main content
New Advanced Threat Defense now includes AI-powered URL analysis Learn more → →
Tag

Phishing

247 articles

Foundational 14 min

Stop Phishing Emails Fast: DMARC, SPF, And DKIM Made Simple

Phishing emails are still the most common entry point for a phishing attack, because a convincing phishing message can fool even vigilant users.

Foundational 3 min

My Website Keeps Crashing: The Secret to Reliable Web Hosting

A website that frequently goes offline disrupts both visitors and business goals.

Foundational 4 min

Urban VPN Proxy extension collects user data!

Urban VPN Proxy extension collects user data! https://media.mailhop.org/phishprotection/images/2025/12/Urban-VPN-Proxy-extension-collects-user-data.

Foundational 4 min

A massive 620% spike in phishing attacks: Courtesy Black Friday sales

A massive 620% spike in phishing attacks: Courtesy Black Friday sales https://www.phishprotection.

Foundational 4 min

Real world cargo: The new obsession of cybercrooks!

Real world cargo: The new obsession of cybercrooks! https://www.phishprotection.

Foundational 13 min

Everything You Need To Know About Email Phishing Filters And Spam Protection

Email phishing remains one of the most prevalent threats in the cyber threat landscape.

Foundational 4 min

KillSec Ransomware targets Brazilian health tech company!

KillSec Ransomware targets Brazilian health tech company! https://www.phishprotection.

Foundational 3 min

Qantas cyber incident: Executives punished by the board!

Qantas cyber incident: Executives punished by the board! https://www.phishprotection.

Foundational 11 min

Spear Phishing Solutions: Protecting Your Business From Targeted Email Threats

Spear phishing represents a highly targeted subset of phishing attacks designed to deceive specific individuals or organizations by masquerading as trustworthy.

Foundational 4 min

Water System Attacks: The New Strategy Leveraged By Threat Actors!

Water System Attacks: The New Strategy Leveraged By Threat Actors! https://www.phishprotection.

Foundational 4 min

Pandora targeted by cybercrooks: Here’s what you should know!

Pandora targeted by cybercrooks: Here's what you should know! https://www.phishprotection.

Foundational 4 min

A notorious Mexican cartel hired a hacker to track and kill FBI witnesses!

A notorious Mexican cartel hired a hacker to track and kill FBI witnesses! https://www.phishprotection.

Foundational 23 min

Anatomy of a Trust-Based Attack: Deconstructing the Nifty.com Phishing Campaign and the New Frontier of Corporate Defense

1. Fortify the "Human Firewall" (Highest Priority) This is the most critical and cost-effective area.

Foundational 4 min

All 14 centers of Kettering Health were affected by a massive ransomware attack, Major outage in the Ohio medical center

All 14 centers of Kettering Health were affected by a massive ransomware attack https://www.phishprotection.

Foundational 4 min

The automobile industry is the new favorite among cyberattackers!

The automobile industry is the new favorite among cyberattackers! https://www.phishprotection.

Foundational 4 min

300K vehicles and trip details exposed as NexOpt experienced a massive data breach!

300K vehicles and trip details exposed as NexOpt experienced a massive data breach! https://www.phishprotection.

Foundational 2 min

Is data theft the new normal in the ransomware ecosystem?

One of the most notorious ransomware gangs across the globe, Lockbit, has warned Kash Patel, the.

Foundational 4 min

Major cyber breach in Taylor Swift’s concert, hackers arrested!

If you’re a die-hard Swiftie, then you should definitely see this!

Foundational 4 min

UK’s compromised encryption move causes a stir worldwide!

Recently Apple decided to remove complete for the United Kingdom people, and it has not gone down so well with the users.

Foundational 4 min

US publication house targeted by threat actors!

One of the largest newspaper groups in the US- Lee Enterprises, faced the brunt of a cyberattack recently.

Foundational 2 min

A staggering 1M patients affected after a critical data breach at the Community Health Center

A significant data breach has occurred at the

Foundational 5 min

GhostGPT- GenAI model that boosts cybercrime

This article aims to find out what makes GhostGPT an absolute favorite among

Foundational 4 min

Volkswagen data breach impacts a whopping 800K EV users!

The automotive industry is increasingly becoming a popular pick among threat actors.

Foundational 3 min

DDoS attacks spike as Africa embraces rapid digitization!

Africa’s rapid digitization attempts have made it a prime target among threat actors. Jumping onto the

Foundational 4 min

India witnesses a steep rise in the number of API attacks!

India has been experiencing an alarming rise in API (Application Programming Interface) attacks, with banking and utilities sectors emerging as primary targets.

Foundational 3 min

Guidelines to follow to send emails to Gmail recipients

Google has always prioritized protecting its users and preventing

Foundational 4 min

Threat actors kill multiple birds with one stone!

Blue Yonder, an AI-oriented supply chain management platform, has been attacked by threat actors. The breach, identified as a , happened on November 21st, 2024.

Foundational 4 min

Apple enthusiasts must know about the two privacy issues in iPhones and iPads!

Just when the whole world is going gaga over the latest launch of

Foundational 4 min

FBI joint operation dismantles Chinese state-sponsored botnet

The FBI recently managed to dismantle a massive

Foundational 4 min

Fortinet data breach compelling enterprises to rethink cloud security!

Fortinet, a security vendor based in California, has recently released an official confirmation regarding a data breach. The hacker, known by the name of...

Foundational 3 min

Google Pixel phones are no longer safe because of this malicious APK!

Do you own a sleek, stylish Google Pixel phone? Then you have to see this!

Foundational 2 min

BlankBot Trojan targets Turkish Android users!

Turkish Android users are being targeted by the BlankBot banking trojan, a new malware designed to steal sensitive financial data and personal information from mobile devices.

Foundational 2 min

Delhi electricity bill scam- Discoms issue warning against cyber fraud!

Delhi electricity distribution companies have issued warnings about a surge in electricity bill scams, where cybercriminals send fake payment links to steal financial information.

Foundational 2 min

Australian hacker pulled off a fake Wi-Fi network scam in not 1 but 3 Australian domestic airports!

Threat actors never fail to surprise us with their

Foundational 3 min

LockBit claims to publish 33 terabytes worth of sensitive data of the US Federal Reserve Bank online

The LockBit ransomware gang, known for its , has just claimed to publish a huge cache file that it allegedly stole from the US Federal Reserve Central Banking.

Foundational 3 min

Children Of Corporate Executives Facing The Brunt Of Ransomware Attacks

Cybercrime has penetrated deep into the corporate world.

Foundational 4 min

That Unpaid Toll Text Message Can Render Your Bank Empty!

emailsecurity · That Unpaid Toll Text Message Can Render Your Bank Empty!

Foundational 3 min

Newbie CoralRaider Targets Asian Brands To Extract Social Media Data

There’s a new kid named CoralRaider in the block of Vietnamese cyber criminals.

Foundational 3 min

Seoul Witnesses a Coalition Against Increasing Phishing Actors!

emailsecurity · Seoul Witnesses a Coalition Against Increasing Phishing Actors!

Foundational 4 min

Threat Actor Entices EU Diplomats With Fake Wine-Tasting Invitation!

Threat actors around the globe are in no mood to hold their horses back. They have been using all the tricks they have up their sleeves.

Foundational 2 min

Okta Phishing Attack Facilitated By CryptoChameleon!

Hacking instances are rampant across the globe, and this time, the target is none other than the Federal Communications Commission or FCC.

Foundational 2 min

NCA Shakeup: Officers Fired in Wake of WhatsApp and Email Blunders!

It came as a shocker when the former Director of Investigation at the esteemed National Crime Agency got sacked because of her “misconduct.

Foundational 2 min

Nest Wallet Co-Founder Fell Victim to a Phishing Attack!

Phishing attacks have become quite rampant over the last few decades. And the latest victim is none other than the esteemed co-founder of Nest Wallet- Bill Lou.

Foundational 4 min

How do Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography?

Cybercriminals have always managed to stay ahead of the cyber security experts in terms of their ability to swiftly adapt to the everchanging technological.

Foundational 5 min

Emerging Threats in the Cybersecurity Landscape: Phishing Campaigns, Email Security, and Information Stealing Malware

Threat actors deploy multiple vectors to launch their cyberattack campaigns.

Foundational 3 min

IPFS Phishing Attacks: Phishing Campaigns Using IPFS Network Protocol on the Rise

There is a significant rise in IPFS phishing attacks in 2023, causing a considerable stir in the digital landscape.

Foundational 3 min

Almost $6 Million Extracted in New Crypto Phishing Fraud from Victims

The latest in the crypto-cybersecurity landscape is the loss of around $6 million from about 5,000 people in a case of a phishing-as-a-service campaign by.

Foundational 4 min

OCBC Phishing Scam: Singapore Bank’s Crisis of $240 Million Additional Capital Requirement

Here is a close look into the details of the OCBC phishing scam, how it happened, the damage it caused, how OCBC handled it, and the masterminds behind it.

Foundational 3 min

Scammers Launch Massive PayPal and MetaMask Phishing Campaigns

In one of the latest phishing scams, malicious actors are impersonating popular platforms like PayPal and MetaMask to target unsuspecting victims.

Foundational 3 min

T-Mobile Hit by a Second Data Breach in 2023: Customers’ Info at Risk, Again

US mobile carrier giant T-Mobile suffered another breach just four months into 2023.

Foundational 3 min

Threat Actors Target Western Digital, Cripple Its My Cloud Service

Undoubtedly, famous public cloud services providers like Amazon, Google, Microsoft.

Intermediate 5 min

Sensitive Information at Risk as a Security Breach Hits US Marshals Service

A major security breach has recently hit the US Marshals Service, putting sensitive information at risk, according to senior law enforcement officials.

Intermediate 5 min

TELUS Launches Investigation After Potential Data Breach Leaks Source Code and Employee Info

TELUS, the Canadian telecom giant, is investigating a potential data breach after a threat actor leaked what appears to be employee data and source code.

Intermediate 6 min

Cybersecurity Updates For The Week 12 of 2023

In today's constantly evolving threat landscape, attackers are always on the lookout for the next opportunity to obtain valuable personal data.

Intermediate 5 min

GoDaddy Customers Beware: Hackers Have Been Stealing Source Code for Years

In the latest cybersecurity breach news, web hosting giant GoDaddy has revealed that malicious actors have been stealing its source code for several years.

Intermediate 5 min

Threat Actors use NameCheap’s Email to Execute Metamask and DHL Phishing Attacks.

The recent security breach and phishing campaign that occurred at Namecheap, a domain registrar.

Foundational 5 min

Threat Actors Breach Reddit and Access Internal Documents, Code, and Business Systems

Threat actors managed to infiltrate the popular social media platform Reddit and access internal documents, code, and some internal business systems.

Intermediate 5 min

Find Out About the Latest Case of Threat Actors Utilizing Phishing-as-a-Service to Steal $120,000

Threat actors made away with $120,000 from an innocent victim by duping them with a sophisticated phishing-as-a-service scam.

Intermediate 5 min

Microsoft Disables Verified Microsoft Partner Network Accounts Used In Malicious Third-Party OAuth App Campaign

The latest online status symbol is getting verified on popular platforms like Instagram, Apple AppStore, or Twitter.

Foundational 5 min

Massive Google Fi Data Breach Opens up Individuals to SIM Swapping Attacks

The Google Fi platform was breached due to one of its unsecured network providers, opening the platform's customers up to SIM-swapping attacks.

Intermediate 5 min

Threat Actors Using Malicious OneNote Attachments to Spread Malware via Phishing Emails

Threat actors have switched to a new type of file for their malicious purposes.

Intermediate 5 min

PayPal Credential Stuffing Attack: Data of nearly 35,000 Accounts at Risk

Nearly 35,000 PayPal customers were the victim of a credential stuffing attack where threat actors got access to their personal and financial information.

Foundational 5 min

The Power of ChatGPT: How ChatGPT is Changing the Phishing Game

ChatGPT is changing the phishing game for threat actors who can use it for crafting phishing emails and bypassing MFA.

Intermediate 5 min

BitRAT Malware Threat Actors Leveraging Stolen Columbian Cooperative Bank Data in Phishing Campaign

The BitRAT malware was used to target the Columbian Cooperative Bank, where the threat actors made away with records of over 400,000 individuals.

Intermediate 7 min

The Role of Employees in Your Company’s Cybersecurity Breach

Cybersecurity is no longer something for ‘other’ companies to worry about.

Intermediate 6 min

Cybersecurity Updates For The Week 2 of 2023

The phishing threat landscape is constantly evolving, with threat actors likely to continue their actions in 2023.

Intermediate 5 min

The Latest Iran-aligned Hacker Phishing Campaign Targeting Middle Eastern Countries

Iran-aligned hacker group, MuddyWater’s latest phishing campaign deploying the new Syncro remote administration tool is causing all kinds of trouble.

Intermediate 5 min

The Password Manager Giant LastPass Says Hackers Stole Customer Vault Data in a Cloud Storage Breach

If you have a LastPass account, which you use to store login information and passwords, or you previously had one that you did not delete.

Intermediate 5 min

Notable Phishing Attacks of 2022

As we enter into 2023, cybercriminals are continuing to evolve their tactics and techniques to carry out phishing attacks.

Intermediate 6 min

Cybersecurity Updates For The Week 1 of 2023

The ability of cybercriminals to operate from anywhere around the world and the increasing linkages between physical systems and cyberspace have led to rising.

Foundational 5 min

Business Essentials: The Top Email Marketing Security Strategies for 2023

Cybercriminals are continually targeting business emails, one of the most effective marketing tools for global businesses.

Intermediate 5 min

New Schoolyard Bully Trojan Targeting Global Android Devices, Steals Facebook Logins

The Schoolyard Bully Trojan is a malware campaign that targets to get into victims' devices and steal their Facebook logins.

Intermediate 5 min

Phishing Campaign Spreading Evolved IceXLoader Malware To Exfiltrate Data

The IceXLoader malware has evolved and is striking via a phishing email, dropping the malware payload capable of advanced, evasive.

Intermediate 6 min

Cybersecurity Updates For The Week 46 of 2022

Over the past years, phishing attacks have evolved in number and intensity.

Intermediate 6 min

Cybersecurity Updates For The Week 45 of 2022

You may hardly find an industry today that is not impacted by phishing attacks.

Intermediate 5 min

Robin Banks Phishing Service Back with Cookie Stealer and Russian Server

The Robin Banks PhaaS platform is back with a new Russian server and a cookie stealer to bypass 2FA and compromise organizational accounts.

Intermediate 6 min

Cybersecurity Updates For The Week 44 of 2022

Threat actors continue to target organizations worldwide to get access to their information assets.

Intermediate 5 min

As Twitter Plans To Charge Verified Users $8 Fee, Threat Actors Start Launching Phishing Campaigns Exploiting The Situation

Scammers and hackers are exploiting the confusion regarding Twitter's new CEO, Elon Musk's plans for paid blue ticks on the platform.

Intermediate 5 min

Social Engineering Attack on Twilio Compromises Employee Accounts and Customer Data

Twilio has suffered a second attack, leading to the compromise of its former and current employee accounts and the loss of sensitive customer information.

Foundational 5 min

Interserve Fined $5 Million by ICO and Why Anti-Phishing Measures are the Need of the Hour

The ICO has fined Interserve £4.4 million, which is about $5 million, due to the data breach compromising the financial and personal data of 113,000 employees.

Intermediate 6 min

Cybersecurity Updates For The Week 41 of 2022

Taking cybercriminals lightly is no longer an option with the evolving threat landscape.

Intermediate 5 min

American Airlines Suffers Employee Email Data Breach, Personal Information at Risk

Airline giant, American Airlines released a data breach notification, informing about a data breach compromising the accounts of its employees.

Foundational 5 min

Iranian-Aligned Cybercriminal Group targets Researchers, Academics, and Journalists with Sophisticated Phishing Campaign

TA453, an Iranian-aligned cybercriminal group, is harvesting credentials by employing multi-persona impersonation.

Foundational 5 min

0ktapus – Okta Breach Helps Attackers Launch Sophisticated Supply Chain Attacks

Organizations implement Multi-factor authentication (MFA) as an enterprise identity security tool to protect them against credential theft.

Foundational 5 min

Phishing Remains the Top Email Threat and Emerging Email Attack Trends by the Latest Abnormal Security Report

Abnormal Security has released the H2 Email Security Threat report highlighting the top email security threats in the first six months of 2022.

Foundational 5 min

Healthcare Industry Continues to be Impacted By Data Breaches According to the Latest Report

HIPAA journal has revealed the latest Healthcare Data Breach report highlighting millions of compromised healthcare records.

Foundational 5 min

How Adversaries Stole Over $500 Million from this Crypto-based Game Using Phishing Tactics

Blockchain gaming is gaining popularity due to the lucrative earning opportunities it offers its players.

Foundational 4 min

New NakedPages Phishing Toolkit Causing a Ruckus in the Cybersecurity Industry

The NakedPages phishing toolkit model has been making headlines since its discovery by CloudSEK researchers.

Foundational 4 min

Cybercrime’s Latest: Matanbuchus Employed in Phishing Campaign to Infect Devices with Cobalt Strike

There is a new phishing spam campaign making headlines in the cybersecurity world that delivers malware onto compromised machines.

Foundational 4 min

Cybercriminals are Duping Millions of Accounts in the Latest Facebook Phishing Campaign

The talk of the town is the phishing campaign on Facebook that has reportedly duped millions into providing their login credentials to cybercriminals.

Foundational 5 min

Phishing Trends in 2022 So Far, And What You Can Learn From Them

Phishing is one of the most formidable threats in the cyber world today.

Foundational 4 min

The Latest Malware Jester Stealer Warning in Ukraine from CERT-UA: Here’s Everything You Need to Know

As the conflict between Russia and Ukraine escalates, the potential of utilizing more lethal weapons, which was previously merely a fear.

Foundational 4 min

Evolving Phishing Attack Trends: A Nightmare for Security Solutions

Phishing has been one of the most widespread cyber threats and a significant challenge for security solutions for almost three decades.

Foundational 4 min

Social Media Impersonation in Phishing: 2022’s Latest Wave of Cybercrime

Cybercrimes have escalated significantly in the past couple of years owing to the mass adoption of online services.

Foundational 4 min

Voice Phishing: Surfacing of a New Cyber Threat on Whatsapp

Researchers at Armorblox found a malicious campaign that targeted WhatsApp users.

Foundational 4 min

Microsoft Azure Phishing Scam: The New Favorite Of Malicious Actors

Microsoft Azure is one of the leading cloud services used by developers and organizations worldwide.

Foundational 5 min

RTLO Phishing Scam Revival – Everything You Need to Know About this Age-old Cyber Threat

The RTLO (or RLO) technique is one of the cybercriminals' oldest and most common techniques.

Foundational 4 min

Threat Actors are Using the Russia-Ukraine Conflict to Launch Phishing Attacks

Recently, according to a Google report, Russian and Belarusian cybercriminals have attacked Ukrainian citizens.

Foundational 3 min

Data Breaches & How They Impact Small Businesses

The rising threat of cyberattacks and data breaches, in particular, can cripple any organization, especially a small business.

Foundational 4 min

Latest Phishing Trends: Financial Services, Facebook, and Microsoft, the Biggest Impersonation Targets of Threat Actors

Phishing remains the top method that cybercriminals use to target individuals and employees worldwide to lure them in and lead them to fake applications.

Foundational 4 min

Ice Phishing – A New Threat to Your Crypto Assets

With its technological advancements, such as Web3, blockchain, and cryptocurrency, the digital world has become a breeding ground for new forms of cyberattacks.

Foundational 4 min

The surge of LinkedIn Phishing Attacks – Courtesy of the “The Great Resignation”

Cybercriminals have always been actively looking for methods to breach security and acquire information that can be used as leverage over the victims.

Foundational 4 min

Two Decades-Old Phishing Attack Revamped

The RLO technique is a simple technique that disguises malicious files making them seem like simple text files.

Foundational 4 min

Cryptocurrency Phishing Scams: 2022’s top and Latest Threat Revealed by Security Regulators

The most significant hazards to investors in 2022, according to NASAA (North American Securities Administrators Association).

Foundational 4 min

Latest Phishing Campaign Targeting Microsoft Proves Why Not Having Multi-Factor Authentication is Risky for Organizations

Phishing is the most frequently used break-in technique and an attack vector malicious actors have used for years.

Foundational 4 min

Threat Actors Exploit Adobe’s Creative Cloud

Entrepreneurs using Adobe Creative Cloud as a part of their organizational operations need to guard against a new cyberattack model employed by threat actors.

Foundational 4 min

Recent FIFA 22 Incident and Phishing Attacks in the Gaming industry

There has been an unprecedented rise in gaming during the last few years, with smartphones making it more popular than ever.

Foundational 5 min

Malicious Actors Exploit Commenting Feature In Google Docs to Send Phishing Emails

According to a recent Axios report, over 2 million monthly active users use G Suite products.

Foundational 4 min

The Rise of Survey Scams in The Advertising Industry And The Precautions Organizations Need To Take To Prevent Such Scams

Digitization has witnessed a sudden boom in online data storage, where not only work but entertainment, education.

Foundational 4 min

QR Code Phishing Attacks: Save Your Organization From The New Wave of Phishing Scams

QR (Quick Response) codes have become widespread with the rise of smartphone usage.

Foundational 4 min

Beware of Omicron Phishing Scams

According to a survey conducted by F5 Labs in 2020, phishing scams have increased by 220% since the onset of the Covid-19 pandemic.

Foundational 4 min

Things You Need to Learn From The Latest GoDaddy Phishing Attack

As the world transforms into a more digitally connected environment, the risks have also amplified manifold.

Foundational 4 min

HTML Smuggling: The New Mode of Phishing Attack

Phishing has long been one of the most common types of cybersecurity threats for enterprises.

Foundational 4 min

Google Ads Impersonation Scams – How to Avoid Falling Victim to Such Phishing Attempts

Google influences many of our buying decisions each day, having an estimated 85-90% of the search engine market share worldwide.

Foundational 4 min

Everything You Need To Know About The Latest Tech Support Scams Involving Phishing Attacks

Tech support teams assist users in overcoming various technical challenges they might be facing while operating a computer or a laptop.

Foundational 4 min

Threat Actors are Leveraging Excel Files to Execute Phishing Campaigns – Here’s Everything You Need to Know!

During the past year, users have come across several attacks that leveraged the technique of Excel 4.

Foundational 4 min

What is Smishing and Why Organizations need to Keep Safe From This Phishing Scam

Smishing, a relatively new form of cyberattack, is threatening millions of small businesses and consumers worldwide.

Foundational 4 min

The Revival Of IDN (Phishing) Attacks With Microsoft Outlook

The Internationalized Domain Name (IDN) consists of a combined Unicode character set with similar Latin and Cyrillic alphabets.

Foundational 4 min

The Rise in Online Payments Has Given Rise to Phishing Attacks

Phishing is one of the oldest forms of social engineering, which malicious actors use to extract critical information from users.

Foundational 4 min

How To Deal With The Most Recent Trends in Spear-Phishing Attacks

With advancements in technology, crimes like cyber theft, phishing, and scamming have increased over the years.

Foundational 4 min

Why Mobile Phishing Attacks Are On The Rise And Strategies On How To Counter Them

According to a recent report, 85% of all organizations have been targets of phishing attacks.

Foundational 4 min

2021 Phishing Trends You Need To Be Wary Of

Social engineering is the technique of employing psychological methods and communication skills, generally by competitors and adversaries.

Foundational 4 min

Domain Squatting And Phishing: Everything You Need To Know

Domain squatting, also known as cybersquatting, can be understood as an intentional act of registering a domain in the name of an already existing organization.

Foundational 4 min

Phishing Continues To Impact Industries Worldwide

In this tech-advanced world where all information and communication has undergone a paradigm online shift.

Foundational 4 min

AI In Phishing: How Artificial Intelligence Can Act As Both, A Boon And Bane When It Comes To Phishing

Cybercrime is directly proportional to improving technology; technology is advancing by leaps and bounds.

Foundational 4 min

Data Breaches And Phishing Attacks: How Third-party Vendors Can Jeopardize Your Organization

The recent pandemic-induced rush of small to medium businesses and large enterprises to get on the cloud has encouraged malicious actors to develop more.

Foundational 4 min

How Threat Actors Use Phishing & Other Methods To Launch Backdoor Attacks

Some of the world's most audacious cyberattack attempts or incidents have happened due to the presence of backdoors.

Foundational 5 min

Increased Phishing Attacks During The Pandemic : How To Stay Safe and Relevant In a Post-COVID Era

Phishing has been one of the favorite modes of cyber-attacks employed by malicious actors for years now.

Foundational 4 min

Crypto Phishing Scams Gaining Momentum With More And More Coins Getting Into The Market

With technology improving by the hour, cybercrime is also steadily on the rise.

Foundational 4 min

Phishing Alert: SolarWinds Hackers Back In Action, Target US Government And 150 Organizations

In a cyber-attack that will be remembered as one of the most significant phishing email attacks in decades to come.

Foundational 4 min

Ransomware Hits: The Reason Why Businesses Need To Adopt Robust Anti-Phishing Measures

Due to the ongoing pandemic, multitudes of people have been obligated to work remotely, making phishing attacks commonplace in the digital world.

Foundational 5 min

Know About The Real-World Solutions To Fight Phishing Attacks Effectively

Combating cyberattacks happen to be a top priority for global organizations.

Foundational 4 min

The Severity Of Phishing Attacks Involving Google Applications And How To Keep Safe From It

With the pandemic raging across the world, many business networks and organizations have switched over to working from home to let themselves be operational.

Foundational 3 min

How To Achieve The Best Phishing Protection?

If you oversee the information security services and administration of the networks in your organization.

Foundational 4 min

Basics Of Phishing: What Is A Supply Chain Attack And Why You Must Be Wary Of It As A New Business Owner

Today, merely knowing how to stop phishing emails cannot guarantee cybersecurity.

Foundational 5 min

The Latest In Phishing Scams: Hackers Can Now Bypass Two-Factor Authentication

Not a day goes by without phishing scams occurring somewhere in the world.

Foundational 4 min

Sim Swap Fraud: The Reason Why You Must Adopt Robust Anti-Phishing Measures Besides 2FA

Cyberspace provides many avenues for malicious actors to attack, exploit and cause damage to individuals and organizations.

Foundational 4 min

6 Biggest Data Breaches From Recent Years That Lay Down The Importance Of Adopting Anti-Phishing & Cybersecurity Tools

Data breaches have become a part of people's daily lives. Every day, there is news about network infiltrations and data stealing. So far, almost 3.

Foundational 4 min

Phishing Is Here To Stay: What Can You Do To Keep Your Information Assets Safe?

The post-pandemic digital age presents several new and exciting opportunities for organizations.

Foundational 4 min

Phishing Case Studies: Learning From the Mistakes Of Others

Phishing remains one of the oldest and the most commonly used modus operandi by cyber adversaries to access network systems globally.

Foundational 4 min

Phishing Attacks In The Tax Season And What To Do About It

Tax season is often punctuated with a mad rush for closures and submissions.

Foundational 4 min

How Threat Actors Take Advantage Of Fintech Platforms To Launch Phishing Campaigns

Technology has made tremendous strides in the recent past. While it has proven beneficial to society, malicious actors have also benefited from the same.

Foundational 4 min

How Adequate Protection Against Malware Can Help Secure Your Organization’s Network Systems

Before we look at ways of protection against malware, let us do a quick recap on what malware is and the extent of damage it can cause.

Foundational 4 min

Keep Yourself Safe From Ransomware: Learn How Do You Get Ransomware

Ransomware is a form of malware that takes control of the victim's system and threatens to block access or delete files if the victim ignores it.

Foundational 4 min

How To Get Past Spam Filters To Make Sure Your Genuine Marketing Emails Are Not Marked As Phishing Ones

An email marketer puts efforts into creating a quality prospective consumer list, designing a great email, and focusing on the campaign's success.

Foundational 4 min

What Makes Government Departments A Prime Target For Cybercrime Such As Phishing Attacks?

Cybercrime is one of the primary forms of menace in the online world. Threats like phishing and ransomware attacks have been around for a long time now.

Foundational 4 min

Phishing Attacks In The Manufacturing Industry: Why Is It A Lucrative Target For Phishers

Various industries have fallen victim to phishing globally, and the manufacturing sector is no exception due to decentralized IT infrastructure and fragmented.

Foundational 4 min

Cybersecurity In Insurance Industry: Why Has It Become A Lucrative Target For Threat Actors?

Insurers deal with enormous risks every day. Risk management is an inherent part of the insurance business.

Foundational 4 min

Phishing Threats That Got Reinforced In 2020, And Will Likely Continue in 2021

With the Pandemic raging across the length and breadth of the world, there has been a lot of chaos and confusion amongst organizations’ workforce.

Foundational 4 min

What Makes Healthcare Sector A Prime Target And What Can Be Done To Avoid These Phishing Attacks?

The medical world has been one of the domains that have seen unprecedented advancement.

Foundational 4 min

The Rise Of Package Delivery Phishing Scams In COVID Times

In times of the Coronavirus Pandemic, when people are too apprehensive of walking to the local stores and malls.

Foundational 4 min

What Makes Financial Institutions A Prime Phishing Target For Threat Actors

All organizations providing financial services such as banking, investment, and insurance constitute financial institutions.

Foundational 3 min

Rising Phishing Attacks On Schools And Colleges As Online Education Becomes More Prevalent Than Ever

As online education has become more prevalent than ever, schools and colleges face tremendous challenges due to COVID-19.

Foundational 2 min

Covid-related Phishing Attacks are Just Getting Started

Covid has been around for more than seven months now. And in that time, it has become the number one source of phishing attacks worldwide.

Foundational 2 min

An Email Phishing Test That Totally Backfired

How good are your employees at spotting phishing emails? There's a really easy way to find out.

Foundational 2 min

The Phishing Attack You Knew Was Bound to Happen

When it comes to preventing phishing attacks, companies are often torn between how to spend their security dollars.

Foundational 2 min

Here Come the Election-Related Phishing Attacks

If it's time for a big election, you can be sure the scammers will take advantage of that in the next round of phishing attacks.

Foundational 2 min

The Surprising Facts Behind Brand Impersonation Attacks

As far as phishing attacks go, brand impersonation is the go-to tactic for attackers.

Foundational 2 min

Phishing Attacks are no Longer Just Malicious Links in Emails

Combating phishing attacks used to be just a matter of not clicking on malicious links in an email.

Foundational 2 min

Is There Something Worse Than Getting a Layoff Notice?

There are two really scary aspects to getting a layoff notice. First, of course, is that you're being laid off, which stinks.

Foundational 2 min

If These Guys Can Get Phished Anyone Can

Who would you expect to be the last organization taken in by a phishing attack?

Foundational 2 min

It Doesn’t Take Long for a Phishing Attack to do its Damage

Given how widespread phishing attacks are, you might think that not only are there a lot of phishing attacks, but that each one lasts a long time.

Foundational 2 min

You’ll Never Guess What was Behind the Great Twitter Hack: Phishing

If you haven't already heard, Twitter was hacked recently and some pretty high-profile people like Barack Obama and Elon Musk had their accounts compromised.

Foundational 2 min

When it Comes to Phishing You Can no Longer Trust Trusted Services

At this point, it's probably impossible to find a company that doesn't rely on some cloud-based trusted services.

Foundational 2 min

The Numbers are in: You Can’t Stop Email Impersonation Without Help

Email impersonation is one of the most prevalent and effective types of phishing attacks. Why is that?

Foundational 4 min

Biggest Heist In Twitter’s History: How Cyber Adversaries Used Coordinated Social Engineering Attack To Target Verified Twitter Accounts Of Celebrities

, the adversaries could successfully barge into some of the most popular accounts of the San Francisco-based social networking platform Twitter.

Foundational 2 min

Something New: The Dual Impersonation Business Email Compromise Scam

As far as phishing emails go, business email compromise (BEC) are amongst the most sophisticated.

Foundational 2 min

Will Office 365 Email Ever Be Safe?

Probably not. Office 365 has two things going against it when it comes to safe email.

Foundational 2 min

When it Comes to Phishing Attacks Hackers Get You Coming and Going

Before COVID-19, pretty much everyone worked in an office so that's where hackers aimed their phishing attacks.

Foundational 2 min

The Scary Phishing Attack on Bank of America

Just detecting a phishing attack on a bank isn't an extraordinary event.

Foundational 2 min

What Follows COVID Phishing Attacks? Black Lives Matter Phishing Attacks!

If it's in the news, it's a phishing attack waiting to happen. First, it was the popularity of the show Game of Thrones. Then it was the new Star Wars sequel.

Foundational 4 min

How To Protect Your SMBs (Small Medium Businesses) From Phishing

In the 21st century, enterprises are facing a severe threat from people they have not met, and may never meet.

Foundational 2 min

The Perfect Phishing Setup: A VPN Configuration from the IT Department

Hackers are always trying different ways to get you to let your guard down.

Foundational 2 min

Why Remote Workers are so Vulnerable to Phishing Attacks

Workers suddenly finding themselves working remotely are extremely vulnerable to phishing attacks.

Foundational 5 min

Phishing: A Threat To Your Business And Employees

With the growing dependence on technology in today’s digital world, phishing attacks are also evolving by each passing the day.

Foundational 5 min

10 Ways Hackers are Using Coronavirus to Phish You

COVID-19 has been a goldrush for hackers looking to exploit the epidemic.

Foundational 2 min

More Bad News for Microsoft 365 Users

As we've written about many times before, Microsoft Office 365's native security does not do a very good job of protecting you from phishing attacks which.

Foundational 2 min

Phishing is Changing but Defense Remains the Same

One of the challenges to stopping phishing attacks is that hackers used to be really nimble.

Foundational 1 min

Sophisticated New Tactic Makes Phishing Emails Harder to Detect

You've seen reCAPTCHA. It's the image verification software that asks you to click on the cars or the crosswalks to verify you're a human being and not a bot.

Foundational 2 min

Zoom isn’t the Only Video Conferencing Service Being Targeted by Phishing Attacks

If you've been paying attention, you know that the Zoom video conferencing service has been in the news a lot recently as a prime target for phishing attacks.

Foundational 2 min

Hackers Now Going After Software Tools Which Help Workers Collaborate

In business today we use software in almost everything we do. What’s proven to be especially useful is web-based software or software-as-a-service (SaaS).

Foundational 2 min

There’s More Than Just COVID-19 Phishing Emails Out There

COVID-19 is certainly grabbing the majority share of the headlines today. And why not? Afterall, it is a worldwide pandemic.

Foundational 2 min

Hackers Leveraging Other Services to Supercharge Coronavirus Phishing Scams

The world is starting to wake up to the onslaught of coronavirus-themed phishing emails.

Foundational 2 min

COVID-19 Fear Leads to Trickledown Phishing Scams

One of the fastest-growing security threats today is coronavirus-based phishing scams.

Foundational 2 min

Coronavirus Requires Two Quarantines

By now, everyone has heard of COVID-19, the coronavirus rapidly spreading across the globe.

Foundational 2 min

How Chatbots Became a Phishing Tool

Whenever someone develops technology to help people, you can be sure that eventually.

Foundational 2 min

Sometimes When You go Phishing You Catch a Shark

It's easy to assume that someone who is rich and famous is also tech savvy, but that's not always the case.

Foundational 2 min

Phishing Attacks Get Really Scary When They Stop Attacking People and Start Attacking Systems

When you think about phishing attacks, most people think the ultimate goal is to get the victim's credentials and use them to possibly impersonate them or.

Foundational 2 min

How Something Meant to Protect Your Mobile Device is Being Used to Phish You

Since mobile devices are essentially computers, it didn’t take long to figure out they needed to be protected like computers.

Foundational 2 min

Hackers Use Recent Tragedies to Target Phishing Victims

Hackers have no soul. They will use any means available to target victims with phishing emails, including seizing on the latest widely-known tragedies.

Foundational 2 min

The News Gets Worse for Victims of Ransomware

Hackers using ransomware to extort money from victims used to have a fairly straightforward playbook: gain access to the victims data.

Foundational 2 min

The Newest Phishing Tactic Designed to Get You to Click

Phishing is a pretty straightforward scam. Get victims to click on a link they shouldn't.

Foundational 2 min

Bad News for Phishing Attacks: AI is Coming

If you're responsible for email security at your company, then you're acutely aware of the role that social engineering) plays in effective phishing attacks.

Foundational 2 min

May the Force Be With You - That Force is a Phishing Attack

The newest Star Wars movie due out this week, The Rise of Skywalker, could just as easily be titled The Rise of Hackers.

Foundational 1 min

The Latest Popular Service to Serve You up Phishing Emails: Spotify

If it's a popular consumer service, you can bet that eventually, hackers will use it in phishing attacks.

Foundational 2 min

How Hotels Leave You Vulnerable to Phishing Attacks

If you invest in phishing protection software, which you should, you probably think you’re safe from phishing attacks.

Foundational 2 min

You’ll Never Guess What Technique Cyberspies Use to Hack into Google

Government-backed cyberspies are always looking for a way to gain access to people's sensitive information.

Foundational 2 min

What Happens When a Phishing Email Isn’t?

Everyone's on the lookout for phishing emails today (or if they're not, they should be). Some people are on high alert and are really good at spotting them.

Foundational 2 min

Healthcare Organizations Still Reluctant to Protect Themselves from Phishing Attacks

What's the old saying? Fool me once, shame on you. Fool me twice, shame on me. Apparently the shame is on the healthcare industry.

Foundational 2 min

Closing on a Home Loan? You’re a Prime Target for Getting Phished

At the end of the day, most phishing emails are based on the same thing: a plausible financial transaction.

Foundational 2 min

The Multiplying Effect of Vendor Email Compromise

By now, most people know about the potential threat from business email compromise or BEC).

Foundational 2 min

Phishers Sure are Cold-hearted

When you tell me that phishers go after large enterprises, I get it. There's a lot of valuable data there.

Foundational 4 min

Ransomware Statistics Present A Grim Scenario About The Vulnerabilities Of The Users

Given the proliferation of the internet and e-mails as the preferred means of communication, ransomware attacks are on an upward spree.

Foundational 4 min

User Accounts On Netflix Hacked By The Thousands

Netflix, the popular online entertainment and video streaming site.

Foundational 2 min

Time for Your Yearly Performance Appraisal? Maybe not!

If you work at an organization, there's a pretty good chance you're in for a yearly performance appraisal.

Foundational 1 min

Hackers Show Once Again They Care About More Than Just Money

When you think of phishing, you probably think of ransomware (which you should).

Foundational 2 min

Why the New Instagram Anti-Phishing Tool Won’t Work

As previously discussed on this blog, Instagram is now more popular than Facebook when it comes to phishing attacks.

Foundational 2 min

You’ll Never Guess Who’s Behind the Latest Phishing Attacks

Would you believe North Korea, Nigeria and Egypt?

Foundational 2 min

Hackers Find One More Way to Use Google to Scam You

At this point, mentioning a new Google attack vector is almost not news anymore, given how many times the company's services have been exploited.

Foundational 2 min

Microsoft and Google Team up to Phish You

When hackers go after you with phishing emails, you'll never guess which brand they impersonate the most. Microsoft.

Foundational 1 min

New Phishing Exploit Leaves Android Phones Vulnerable

Got an Android Phone? You're going to love this. Attackers can now take control of your phone over-the-air.

Foundational 2 min

Phishing Attacks Now Coming in Stages

It never ceases to amaze how clever hackers are or how far they'll go to phish someone.

Foundational 4 min

Threats From Obsolete Phishing Protection: Are You Safe?

The rate of cybercrimes has risen drastically across the globe in recent times.

Foundational 2 min

All Those Security Breaches are Finally Coming Home to Roost

It seems like every week we hear about another major security breach.

Foundational 4 min

White House – The Most Secure Place In The World Targeted By Cyber Criminals Through Spear Phishing Attacks

It was not long ago the white house was in the news when US intelligence agencies concluded Russia tried to sway the US presidential election in favor of.

Foundational 2 min

Phishing Prevention: Email Providers Aren’t Helping Any

How many employees have to get phished before they take action? How much ransomware has to be paid before they take action?

Foundational 2 min

The Homograph Phishing Attack: The Antidote to Awareness Training

If you've ever taken phishing awareness training, you've most likely been taught to identify domain name spoofing.

Foundational 2 min

One Phishing Filter is Not Enough Which is Why You Need Six

A recent article on the Help Net Security website discussed the results of research into the effectiveness of phishing filters.

Foundational 4 min

13 Spear Phishing Attacks Examples To Justify Investment For Phishing Prevention Solutions In Your Organization

Spear Phishing is a type of phishing attack which generally targets “Whales” or “high-level organizational actors” such as C-suite executives (e.g.

Foundational 2 min

Office 365: Almost Any Amount You Spend to Avoid a Phishing Attack is Worth it

Osterman Research came out with their Office 365 Email Security 2019 Benchmarking Survey and the results are scary for organizations using Office 365 for email.

Foundational 2 min

Spear Phishing: The Greatest Threat to Democracy

What's the greatest threat to democracy today? How about election results that can't be trusted because the election was manipulated by hackers.

Foundational 1 min

Reeling in a Different Kind of Phish at Sea

Fishing can be a very profitable enterprise. Many commercial fishing fleets head out to sea each day hoping to land a big catch.

Foundational 2 min

What to do If You’re Hit by Ransomware

There's much debate going on today about what to do if your organization gets hit by ransomware. There's really only two choices: pay it or don't.

Foundational 4 min

Is Paying Ransom Being Considered As The Best Way Out For Dealing With Ransomware Attacks

Phishing has been on the rise in form or the other, ever since users have started to use emails, messages, phones, etc. Every other month, around 1.

Foundational 1 min

Death, Taxes and the Evolution of Phishing Attacks

They say nothing is certain in life except for death and taxes. You can add one more to that list: phishing attacks.

Foundational 1 min

When the Department of Homeland Security isn’t so Secure

, the Department of Homeland Security's (DHS) mission is "to secure the nation from the many threats we face.

Foundational 2 min

Ever Heard of an Angler Phishing Attack?

You wouldn't put up a neon sign outside your home that says "rob this house" before you left for a week's vacation.

Foundational 4 min

Five Phishing Tactics Sure to Trick You Into Clicking

By now, most people know that 91% of cyberattacks start with a phishing email.

Foundational 2 min

Everyone Loves PDFs Including Hackers

If you're doing business, then you're sending, receiving and reading PDFs. PDFs have become ubiquitous in business as a way of sending documents over the web.

Foundational 2 min

The Problems With Paying a Phishing Ransom

If you haven't been paying attention, a lot of organizations have been hit by ransomware lately, almost all of which are triggered by a phishing email.

Foundational 1 min

Phishing Prevention: If Users are the Weakest Link, Why is Training the Only Solution?

In cybersecurity, there's a best practice called Defense in Depth. The idea behind Defense in Depth is very simple.

Foundational 2 min

Phishing Awareness Training is Getting Some Large Investments

It sure is a good time to be in the phishing awareness training business, especially if you're looking for investors to invest in your company.

Foundational 1 min

Phishing: The Good, the Bad and the Ugly of Google

Google is great. It offers a lot of useful services for free. And those services are tightly integrated so they work well together.

Foundational 1 min

Some Truly Startling Phishing Statistics

Which phishing statistic is scarier? That 94% of organizations say they were hit with a phishing attack in 2018 or that the attacks themselves may be underrepor

Foundational 2 min

SaaS Makes Business Easier and More Vulnerable

Software-as-a-service (SaaS) is being used more and more to deliver mission critical services to business of all sizes.

Foundational 2 min

How Perfectly Safe Emails From Trusted Parties Suddenly Turn Dangerous

When you think of phishing attacks, you think about some hacker directly sending you a malicious email with the hope that you'll trust them and click on a link.

Foundational 2 min

Phishing Attacks: Top Executives Better be Worried

If you're in the C-suite, you'd better get yourself some phishing protection.

Foundational 1 min

When it Comes to Getting Phished, Game of Thrones is no Fantasy

Phish protection technology is needed more than ever for fans of the wildly popular TV show Game of Thrones.

Foundational 2 min

Compromised Microsoft Credentials is Code for They Got Phished

If you haven't already heard, Hackers compromised Microsoft support agent’s credentials to access customer email accounts.

Foundational 2 min

The Only Thing Worse Than Clicking on a Malicious Link in a Phishing Email

You might think that the worst thing you can do with a phishing email is to click on the malicious link embedded within. You'd be wrong.

Foundational 2 min

How Someone Else Getting Phished Can Cost You Your Life

When it comes to phishing attacks, you probably don't give it a second thought when someone else gets phished. But maybe you should.

Foundational 2 min

Phishing Prevention Best Practices eBook is Right on the Mark

phishing prevention best practices eBook , we provide ten best practices for small and mid-size businesses. We know these practices work.

Foundational 2 min

Why More and More Phishing Attacks are Going After Mobile Users

Phishing attacks are hard to stop because hackers are extremely sophisticated and they use every method available.

Foundational 3 min

Phishing in the News

2018's Primary Breach Actors Were Malicious Outsiders by security firm Tripwire, "2018’s primary breach actors were malicious outsiders.

Intermediate 4 min

Do I Need Third-Party Phishing Protection for Office 365?

Office 365’s security features won’t protect users from all cyber security threats. Microsoft’s cloud-based Office 365 user base is growing at a steady rate.

Advanced 4 min

Phishing Attack Mechanics: How Cybercrime Strategy Works

Phishing attacks follow five key steps. Effective cybersecurity prevents them at each one. “They’re not interested in companies like ours.

Foundational 5 min

The Top 5 Phishing Scams in History – What You Need to Know

Learn how to protect yourself by studying the biggest phishing scams in history If we draw an analogy between phishing and fishing.