Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...
Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps

Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...
Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...
Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics

Have you ever had your lunch interrupted by a sudden barrage of security alerts? That’s exactly what happened to one of our clients when a frantic call from their Security Operations Center ...
New Age Phishing Threats and How to Plan Ahead

New Age Phishing Threats and How to Plan Ahead

These new age phishing threats utilize sophisticated tactics like social engineering, which make them challenging to detect and mitigate ...

BYOD Trends and Endpoint Security — What’s best for your organization?

The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of remote work brought on by the pandemic have influenced the phishing landscape with significant business impact. While ...

Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat ...

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email. They break down these phishing attack vectors in this way: ...

5 Ways URL Analysis and Enrichment Benefits Managed Service Providers

Researching URLs in suspected phishing incidents is a costly and time-intensive process, according to a survey* of 300-plus security decision-makers. Nearly half of all survey respondents (47%) reported spending up to 10 ...

Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat ...