Using Blob URLs to Bypass SEGs and Evade Analysis

Using Blob URLs to Bypass SEGs and Evade Analysis

Starting in mid-2022, Cofense Intelligence detected a new technique for successfully delivering a credential phishing page to a user’s inbox: blob URIs (Uniform Resource Identifier).  ... Read More
Spain and Portugal Power Outages Spark a Surge in Phishing Attacks

Spain and Portugal Power Outages Spark a Surge in Phishing Attacks

Spain & Portugal Power Outages Spark a Surge in Phishing Attacks ... Read More

Global Manufacturing Leader Strengthens Email Security

| | Case Studies
Global Manufacturing Leader Strengthens Email Security ... Read More

Protecting Your Business from Vishing Threats

| | Industry Best Practices
Vishing, or "voice phishing," continues to be a silent yet formidable cyber threat for businesses of all sizes. While traditional phishing and smishing (SMS phishing) are widely recognized, vishing often flies under the radar, leaving organizations vulnerable to devastating attacks.  ... Read More
Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims ... Read More
Thinking of Smishing Your Employees? Think Twice.

Thinking of Smishing Your Employees? Think Twice.

| | Industry Best Practices
Thinking of Smishing Your Employees? Think Twice ... Read More
Exploiting SMS: Threat Actors Use Social Engineering to Target Companies

Exploiting SMS: Threat Actors Use Social Engineering to Target Companies

| | cybersecurity trends
Exploiting SMS: Threat Actors Use Social Engineering to Target Companies ... Read More
Amazon Gift Card Email Hooks Microsoft Credentials

Amazon Gift Card Email Hooks Microsoft Credentials

| | cybersecurity trends
Amazon Gift Card Email Hooks Microsoft Credentials ... Read More
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders

The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders

The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders ... Read More
Pick your Poison - A Double-Edged Email Attack

Pick your Poison – A Double-Edged Email Attack

| | cybersecurity trends
Pick your Poison - A Double-Edged Email Attack ... Read More