Figure 1: Original Posting of LokiBot by Lokistov.

LokiBot – Phishing Malware Baseline

By Madalynn Carr Report date: 09/07/2023 LokiBot is an Information Stealer with expanding capabilities depending on the threat actor. This malware family was originally written in C++ and targets Windows devices. LokiBot ...

Demystifying Smishing vs Phishing Attacks for a Safer Online Experience

Staying safe online is more important than ever. Cybercriminals are becoming more sophisticated in their methods, making it key for internet users to be well-informed about threats. One common type of attack ...
The Lure of Subject Lines in Phishing Emails

The Lure of Subject Lines in Phishing Emails

By Max Gannon The use of misleading dates in subject lines has long been a preferred tactic of threat actors for influencing the emotions of recipients and creating a false sense of ...

5 Ways to Maximize Your Organization’s Resiliency Rate

Resiliency rate is an important metric in security awareness training (SAT), as it measures how successful a program has been in preparing employees to recognize and respond to potential threats.   By ...

5 Insights on Managed Phishing Detection and Response (PDR)

Do you want to keep your emails secure but find yourself having to operate with a limited budget and resources? Is your SOC team overloaded? You’re not alone. Many businesses are facing ...
Security Authentication Scan

Major Energy Company Targeted in Large QR Code Campaign

Author: Nathaniel Raymond Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.  The most notable ...
Security Authentication Scan

Major Energy Company Targeted in Large QR Code Campaign

Author: Nathaniel Raymond Beginning in May 2023, Cofense has observed a large phishing campaign utilizing QR codes targeting the Microsoft credentials of users from a wide array of industries.  The most notable ...
Figure 1: Example of a Google AMP URL.

Google AMP – The Newest of Evasive Phishing Tactic

Author: Dylan Duncan A new phishing tactic utilizing Google Accelerated Mobile Pages (AMP) has hit the threat landscape and proven to be very successful at reaching intended targets. Google AMP is an ...
Figure 1: Example of a Google AMP URL.

Google AMP – The Newest of Evasive Phishing Tactic

Author: Dylan Duncan A new phishing tactic utilizing Google Accelerated Mobile Pages (AMP) has hit the threat landscape and proven to be very successful at reaching intended targets. Google AMP is an ...

3 Ways MSPs/MSSPs are Helping SMBs Do More with Less Around Email Security – Consolidation Without Compromise

Today’s disruptive environment has caused small and medium-sized businesses (SMBs) to face unprecedented technological hurdles. And thanks to limited resources and a lack of cybersecurity experts, many SMBs are finding themselves even ...