The Vast Social Media Landscape for Phishing Threats

The Vast Social Media Landscape for Phishing Threats

On a daily basis, around 42% of the global population, or 3.2 billion people, uses some form of social media. Of that number, people spend a daily average of 2.2 hours on these networks, too. These two numbers are exactly why threat actors continue to flock to social media to ... Read More
Why Social Media is Increasingly Abused for Phishing Attacks

Why Social Media is Increasingly Abused for Phishing Attacks

Today, social media is a daily medium for communication for much of the modern world, and adoption only continues to grow. Because of this, much like how threat actors started to target mobile users, they have begun to abuse social media, too ... Read More
BEC Attacks: How CEOs and Executives are Put at Risk

BEC Attacks: How CEOs and Executives are Put at Risk

Business Email Compromise (BEC) attacks are the most costly and effective forms of phishing. In most cases, these attacks use highly research social engineering to go after the top brass in a company with a motive of stealing corporate dollars or breaching their network ... Read More
BEC Attacks: A Closer Look at Invoice Scams

BEC Attacks: A Closer Look at Invoice Scams

| | bec
Business Email Compromise attacks are some of the most costly and vicious forms of phishing. Unlike the standard pray and spray approaches to phishing, they take a great deal of research and personalization to persuade a victim to hand over their credentials or wire them funds. This week we’re taking ... Read More
How Spear Phishing Makes BEC Attacks So Effective

How Spear Phishing Makes BEC Attacks So Effective

| | bec
Everyone will at some point see a standard phishing email. Be it the 409 Scam (Nigerian Prince) or even a fake password reset, these are pretty easy to spot, and most people delete it without flinching. However, for the select few who have been on the receiving end of a ... Read More
How Business Email Compromise (BEC) Attacks Impact Everyone

How Business Email Compromise (BEC) Attacks Impact Everyone

| | bec
Business email compromise (BEC) attacks are among the most effective forms of phishing in our modern world. Regardless of the technology in place, the social engineering involved easily will bypass it and can trick even trained users ... Read More
Threat Actors are Increasing Their Use of Free Hosts

Threat Actors are Increasing Their Use of Free Hosts

| | PTI Report
In our continued expansion and exploration of data from this year’s annual Phishing Trends and Intelligence report it’s time to take a closer look into free hosts. More specifically, the free hosts and domains that threat actors abuse in order to further distribute phishing attacks. While phishing sites that abuse ... Read More
More Than Half of Phishing Sites Now Use HTTPS

More Than Half of Phishing Sites Now Use HTTPS

| | HTTPS
As Google Chrome and other web browsers further embrace HTTPS in a visual way, it’s becoming a requirement that threat actors use it, too. By the end of Q1 2019, more than half of all phishing sites have employed the use of HTTPS, now up to 58%. This is a ... Read More
The Definition of Phishing

The Definition of Phishing

| | Phishing
Defining phishing is simple, right? Not exactly ... Read More
Should User Passwords Expire? Microsoft Ends its Policy

Should User Passwords Expire? Microsoft Ends its Policy

If you have ever worked for an organization that uses Microsoft-based systems, there is a high likelihood that your IT or security team has implemented a policy that occasionally forces you to create a new password. Years ago it was every three months, then every two, and so on. This ... Read More