Phishing Attacks Are Scarily Easy to Build

Targeting People, Not the Infrastructure Historically, many cyberattacks tended to be technology-focused and required specialized knowledge to expertly fool a network into believing the attacker was an authorized user. Spoofing, man-in-the-middle (LAN ...

The URL “Danger Zone”

Inadequate Security Policies with Uncategorized Sites The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed ...

Multi-Stage Phishing Attacks Are Dangerous

Threat actors rely on a mix of tactics that take advantage of a user’s lack of attention to draw them into interactions designed to hide malicious intent ...