
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
Stephen Kowski | | bec, Browser Phishing Protection, Browser protection, business email compromise, credential theft, Email Protection, Link Phishing, Phishing, Phishing Attacks, Product, social engineering
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we will explore a real-life example of this: the abuse of DocuSign’s actual application to deliver malicious links. Then, ... Read More

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
Stephen Kowski | | bec, Browser Phishing Protection, Browser protection, business email compromise, credential theft, Email Protection, Link Phishing, Phishing, Phishing Attacks, Product, social engineering
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we will explore a real-life example of this: the abuse of DocuSign’s actual application to deliver malicious links. Then, ... Read More

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, cybercriminals are not just focusing on well-known platforms like DocuSign and Microsoft. They’re expanding their reach, exploiting a ... Read More

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, cybercriminals are not just focusing on well-known platforms like DocuSign and Microsoft. They’re expanding their reach, exploiting a ... Read More

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence, social engineering, Threat Intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center revealed a flood of suspicious emails. The culprit? A brand-new cyberattack mimicking the notorious Black Basta group’s latest ... Read More

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics
Stephen Kowski | | AI Security, bec, Black Basta, Email Protection, generative AI, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing threats, real time phishing threat intelligence
Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center revealed a flood of suspicious emails. The culprit? A brand-new cyberattack mimicking the notorious Black Basta group’s latest ... Read More

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed a 98% increase in the use of DocuSign phishing URLs compared to all of September and October. In ... Read More

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Stephen Kowski | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, demonstrating how cybercriminals leverage trusted enterprise solutions to deceive even the most vigilant users. Let’s break down this ... Read More

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email security measures amidst an ever-evolving threat landscape. With the proliferation of phishing attacks and ... Read More

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical importance of robust email security measures amidst an ever-evolving threat landscape. With the proliferation of phishing attacks and ... Read More