Using Legitimate Services to Bypass Phishing Protections
Researchers at Abnormal Security have identified two techniques that attackers are using to bypass email security filters. The first tactic takes advantage of the fact that Microsoft ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
Researchers at Abnormal Security have identified two techniques that attackers are using to bypass email security filters. The first tactic takes advantage of the fact that Microsoft ...
Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing ...
UK Research and Innovation (UKRI) has been hit by a ransomware attack that impacted two of its services, BleepingComputer reports. The UK government department said it’s still unsure if ...
New data shows that pushback from the ransomware victim “market” may be influencing just how much cybercriminals are asking for as ransom and are being paid.
Researchers at Menlo Security warn of an ongoing Trickbot campaign targeting the legal and insurance industries. Trickbot is a notorious remote access Trojan that was in the crosshairs of ...
Here are important fresh content updates and new features to share with you that happened in the month of January.
A cybercriminal gang has recently developed a new phishing kit named LogoKit on several domains. LogoKit changes logos and text in real-time in order to adapt to the targeted victims.
As cybercriminals look for new ways to attack organizations, the National Security Agency takes a hard look at how DNS can be manipulated and makes recommendations on how to secure it.
New data from the Australian government’s Scamwatch site shows that phishing and vishing topped the list of scam types used to trick Australians into becoming a scam’s next victim.
Despite the U.K. government’s position that organizations should not make ransomware payments, the Association of British Insurers (ABI) includes payments in first-party cyber-insurance ...
A phishing campaign is using convincingly spoofed offers for COVID-19 vaccination sign-ups, according to Tom Allen at Computing. As vaccines are now being distributed around the world, ...
Natee Pretikul, Senior Program Manager in Microsoft's Identity Engineering Strategic Alliances team just send us the following:
A survey by ESET found that most people think they’d be able to identify scam emails while shopping online. 87% of respondents said they felt secure while shopping online, while 73% ...
The US Cybersecurity and Infrastructure Security Agency is launching a campaign to raise awareness of the ways organizations can defend themselves against ransomware attacks.
We’re excited to announce the official trailer for Season 3 of the award-winning KnowBe4 Original Series - ‘The Inside Man’ is now available! KnowBe4’s network-quality video training ...
A publishing goof by cybercriminals on a WordPress site made files containing stolen passwords indexable by Google and were subsequently publicly available via search.
New data from Check Point Research highlights the latest details on which brands are impersonated, giving insight into where the bad guys are most successful.
The WEF just published their recent survey over worldwide corporate leaders. When asked about technology objectives that have become a greater priority due to COVID, they elevated ...