
Using Blob URLs to Bypass SEGs and Evade Analysis
Starting in mid-2022, Cofense Intelligence detected a new technique for successfully delivering a credential phishing page to a user’s inbox: blob URIs (Uniform Resource Identifier). ... Read More

Spain and Portugal Power Outages Spark a Surge in Phishing Attacks
Spain & Portugal Power Outages Spark a Surge in Phishing Attacks ... Read More
Global Manufacturing Leader Strengthens Email Security
Global Manufacturing Leader Strengthens Email Security ... Read More
Protecting Your Business from Vishing Threats
Vishing, or "voice phishing," continues to be a silent yet formidable cyber threat for businesses of all sizes. While traditional phishing and smishing (SMS phishing) are widely recognized, vishing often flies under the radar, leaving organizations vulnerable to devastating attacks. ... Read More

Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims
Custom-Crafted, Qantas-Spoofing Emails Target Australian Victims ... Read More

Thinking of Smishing Your Employees? Think Twice.
Thinking of Smishing Your Employees? Think Twice ... Read More

Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
Exploiting SMS: Threat Actors Use Social Engineering to Target Companies ... Read More

Amazon Gift Card Email Hooks Microsoft Credentials
Amazon Gift Card Email Hooks Microsoft Credentials ... Read More

The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders ... Read More

Pick your Poison – A Double-Edged Email Attack
Pick your Poison - A Double-Edged Email Attack ... Read More