Nearly One-Quarter of All Emails Are Considered to be Malicious
The quantity of emails involved in scams and cyber attacks continues to grow as credential theft and response-based phishing persist as top attack variants.
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
The quantity of emails involved in scams and cyber attacks continues to grow as credential theft and response-based phishing persist as top attack variants.
A new scam aimed at stealing your credit card and banking information has reared its’ ugly head as a completely legitimate ad that is likely to be clicked based on the corresponding ...
PoisonGPT works completely normally, until you ask it who the first person to walk on the moon was.
Researchers at Check Point outline various forms of tailgating attacks. These attacks can allow threat actors to bypass physical security measures via social engineering.
As the rate of ransomware attacks steadily increased over time, there are clear indicators as to how these attacks are starting and, therefore, what can be done to stop them.
Using a new twist to bypass detection from security solutions, cyber attacks are now employing QR codes that your users will not recognize as anything suspicious.
Researchers at Veriti have observed hundreds of spoofed domains following Meta’s launch of its Threads social media platform.
On July 10th, the EU Commission adopted anadequacy decision for the proposed EU-U.S. Data Privacy Framework. This is exciting news for organizations, as many have been stuck in privacy ...
A phishing campaign is targeting the tourism and hospitality industries, according to researchers at Votiro.
Australia officially launched their National Anti-Scam Centre this week. With more than AUD $3.1 billion lost each year, Australians need support.
Job scams are a rising form of socially engineered cybercrime. And while it’s easy to imagine the trouble they cause individuals who innocently fall for them (lost opportunities, identity ...
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.
A new threat alert from ConsumerAffairs and TrendMicro proves more than just shoppers will take advantage of Amazon’s upcoming Prime Day.
The latest data provided by the Singapore Cyber Emergency Response Team (SingCERT) shows the number of attacks trending in the wrong direction, with some indicators that the good guys ...
The British national responsible for hacking into and impersonating high-profile individuals as part of a crypto theft scheme has been sentenced to five years in prison.
From the “shaking our heads” files comes the story of how threat actors compromised military personnel mobile devices, credentials, accounts and more.
Apparently expanding efforts outside of Southeast Asian countries, this threat group’s known malware has shown up in a European healthcare facility, raising concerns for USB-based attacks.
An abnormally massive focus on business email compromise attacks in Europe has fueled an equally large growth in overall email attacks there, with the U.S. also seeing significant attack ...