Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Phishing is Still the #1 Cyber-Fraud Tactic

Online, e-commerce and mobile fraud are on the rise, according to RSA, with 41% of successful attacks enabled by phishing scams.
Continue Reading

Scam Of The Week: SharePoint Phishing Attack On Office 365 Users

The attack dubbed “PhishPoint” by Cloud Security vendor Avanan demonstrates the craftiness and extent cybercriminals will go to in order to harvest Office 365 credentials.
Continue Reading

Is IT Even Trying to Thwart Social Engineering Attacks?

With so much else on their plate, are today’s IT organizations doing enough to protect the organization against social engineering and phishing attacks?
Continue Reading

Social Media Facial Recognition Could Make the Bad Guys Worse

Trustwave shows how the latest advancements in technology could be used to aid cybercriminal activity.
Continue Reading

Why Doesn’t Cyber Insurance Have Phishing Prevention Discounts?

Whether online-related or not, insurance is insurance. So, shouldn’t there be discounts for organizations who demonstrate cyber-responsibility?
Continue Reading

[Heads-up] Warn Your Employees. This Is The Year That Sextortion Spear Phishing Is Skyrocketing...

Intrepid cyber-investigative reporter Brian Krebs noticed that a story published on his blog July 12 about a new sextortion-based spear phishing scheme—which uses a real password used by ...
Continue Reading

OK, Guys, this one is for you. Yes, you. The guy who keeps friending strange women on Facebook

This was sent to me by a friend that I know is legit. It's a fun read and has some good tips on how to stay safe using social media.
Continue Reading

Phishing Continues to be on the Rise in 2018!

It should come as no surprise that the most successful attack tactic is being used more in 2018. APWG’s latest report shows us the trends and what to expect for the remainder of 2018.
Continue Reading

New UK Phishing Campaigns Lure Industry Targets With Compromised Email Contacts

A new batch of U.K. phishing campaigns is using compromised email contacts to lure targets from the engineering, transport and defense sectors.
Continue Reading

Spam Remains the Criminals' Favorite Online Tool

Spam is forty years old, and it's still the enduring favorite of cyber criminals. What's reckoned to have been the first spam was distributed in 1978 over ARPANET. ARPANET would evolve ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews