Analysing a massive Office 365 phishing campaign

Analysing a massive Office 365 phishing campaign

Last week, a friend of mine reached out with a query: a contact in his address book had sent him a suspicious email. As it turns out, it was. In this blog ...
™

Understanding 6 Key Terms Used to Describe Phishing Schemes

When we think about phishing attacks and threats, it’s understandable that most people think ... The post Understanding 6 Key Terms Used to Describe Phishing Schemes appeared first on SlashNext ...
™

Spear Phishing HR for Sensitive Employee Data – Attacks are on the Rise

ADP, one of the nation’s largest HR-related data processors, last year saw a 230 ... The post Spear Phishing HR for Sensitive Employee Data – Attacks are on the Rise appeared first ...
Phishing: An Ever-Evolving Threat

Phishing: An Ever-Evolving Threat

Whether it is was scammers duping World Cup fans with enticing emails touting a free trip to Moscow or the test against the DNC, phishing attacks were clearly the headline-grabbing darlings of ...
Security Boulevard
Let’s talk about Social Engineering Small Businesses

Let’s talk about Social Engineering Small Businesses

If you work for, or with, small to mid-sized companies, you may think the risk of social engineering attacks are lower for you. You know all 30-100 people in your office so ...
Arrests in a major international cybercrime

Fin7 and the Perfect Phish

For the past twenty years, one of the main pieces of advice our industry gave to people regarding their email was "don't open attachments from people you don't know." But what if ...
Understanding Why Spear Phish Are Highly Effective

Understanding Why Spear Phish Are Highly Effective

| | spear-phishing
In the Oscar-winning movie The Sting, Harry Gondorff (played by Paul Newman) explains to his apprentice Johnny Hooker (Robert Redford) that the con that they set up must be so convincing that ...
What's New in Bromium Secure Platform, version 4.1

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable ...
Email Security Breaches Rises

Cost of Email Security Breaches Rises

The fact that email is the single-biggest threat vector won’t come as much of a surprise to most cybersecurity professionals. But the fact that the costs associated with those attacks are increasing ...
Security Boulevard
Olympic Destroyer Moves from Pyeongchang to Europe and Russia

Olympic Destroyer Moves from Pyeongchang to Europe and Russia

Olympic Destroyer, the threat actor that targeted the 2018 Winter Olympics in Pyeongchang, South Korea, has launched new attacks against organizations from Russia, Ukraine and several other European countries. To sabotage the ...
Security Boulevard
Loading...