Human Risk Management Blog

Phishing

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Phishing Attacks Are Exploiting the War in Iran

Criminal threat actors are taking advantage of the fear and uncertainty surrounding the conflict in the Middle East, according to researchers at Bitdefender. The researchers observed a ...

How to Prevent Phishing Emails by Reducing Human Risk

Organizations have traditionally treated phishing emails as a technology problem to be solved with spam filters and secure email gateways.

The New Playground for Cybercriminals: Securing the Microsoft Teams Frontier

With 320 million daily users on Microsoft Teams, the ability to connect with colleagues across the organization has never been more seamless… or more targeted. The shift isn’t just about ...

Custom Fonts Can Trick AI Assistants Into Approving Phishing Sites

Researchers at LayerX warn that custom fonts can fool AI web assistants into thinking phishing pages are benign, while the human user sees something completely different.

Report: Attackers Can Trick AI Assistants Into Displaying Phishing Messages

Researchers at Permiso warn that threat actors can plant phishing messages within Copilot AI summaries. Notably, the researchers found that attackers can trick Copilot into including ...

Scammers Abuse Calendar Invites to Plant Phony Subscription Notices

Malwarebytes warns that a phishing campaign is using Google Calendar invites to send phony renewal notices for Malwarebytes subscriptions. The calendar invites contain a phone number that ...

Shipping-Themed Phishing Scams Target the Middle East and Africa

A surge in shipping-related phishing scams is targeting the Middle East and Africa (MEA) region, according to researchers at Group-IB.

Creating Noise: The Emerging Obfuscation Technique Designed to Evade Email Security NLP Detection Capabilities

Our Threat Intelligence team has observed an emerging obfuscation technique, specifically used to make Natural Language Processing (NLP) detection capabilities less effective. Broadly, ...

FBI: Phishing Attacks Are Impersonating City and County Officials

The US Federal Bureau of Investigation (FBI) has issued an advisory warning of a phishing campaign that’s impersonating city and county officials to send phony requests for permit fees.

What Is OSINT?

OSINT stands for open-source intelligence. It is the collection, analysis, and dissemination of information from publicly available sources, such as social media, government reports, ...

Fake Calendar Invitations Move to Microsoft Outlook

Fake calendar invites have been a problem on Gmail for years. Even though they could appear on other calendar services, I hadn’t seen or read about a lot of it. Gmail had been taking the ...

What Tools Do Hackers Use to Weaponize Emails?

Email attacks have become one of the key ways for hackers to target organizations and individuals. The sheer number of tools available has made it easier than ever for non-technical ...

Phishing on Messaging Apps: How Attackers Use WhatsApp, Teams, Slack, and SMS

Messaging platforms are now a major vector for phishing and other social engineering attacks, according to a new report from NCC Group’s Fox-IT.

Spear Phishing Attacks: Top 7 Signs to Watch For

Spear phishing is on the rise in the US and is quickly becoming the biggest cybersecurity threat for businesses. With more sophisticated, human-like emails and a greater reliance on email ...

Phishing Simulation: How It Works to Reduce Risk

Phishing isn’t just increasing. It’s outpacing the way many organizations test for it. Attacks have surged 400% year over year, and corporate users are now more likely to be targeted by ...

How to Identify a Phishing Website

Our increasing dependence on the internet and, specifically, email for business and personal communication has produced the perfect environment for cybercriminals to launch phishing ...

Fake Video Meeting Invites Trick Users Into Installing RMM Tools

Threat actors are using phony meeting invites for Zoom, Microsoft Teams, Google Meet, and other video conferencing applications to trick users into installing remote monitoring and ...

What Happens If I Click A Phishing Link?

Phishing is the most prominent form of cyber-attack, regularly prompting email recipients into disclosing their personal information, credentials, downloading malware, or paying ...

Warning: Attackers Are Using DKIM Replay Attacks to Bypass Security Filters

Cybercriminals are abusing legitimate invoices and dispute notifications from popular services to send scam emails that bypass security filters, according to researchers at Kaseya’s INKY. ...

North Korean Hackers Target Job Seekers With Phony Interviews

North Korean hackers continue to target software developers via social engineering attacks, according to researchers at Recorded Future.


Get the latest insights, trends and security news. Subscribe to CyberheistNews.