Scaring People with GDPR
Criminals are taking advantage of misunderstandings surrounding the European Union’s General Data Protection Regulation (GDPR) to exploit gullible employees and organizations, according ...
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
Criminals are taking advantage of misunderstandings surrounding the European Union’s General Data Protection Regulation (GDPR) to exploit gullible employees and organizations, according ...
Highly targeted phishing attacks, known as Business Email Compromise or CEO fraud scams have exceeded $12.5 billion in total known losses worldwide (according to the FBI). These social ...
A Georgia resident has taken a guilty plea to charges of hacking numerous Apple accounts belonging to high-profile athletes and musicians and stealing their credit card information, ...
Organizations are working to limit the effectiveness of phishing attacks using both internal and external collateral and programs. According to ISACA, the important thing is to have ...
Cybercriminals are using every means available to reach their victims. According to Verizon’s latest data, attacks on mobile devices are increasing while security efforts fall behind.
Most companies have not implemented standards for authenticating emails and preventing hackers from successful phishing attacks, according to Valimail.
Lower-level employees are the workers most likely to face highly-targeted attacks, according to the online marketing firm Reboot. Citing information from Proofpoint’s most recent ...
The domains had been used as part of spear-phishing campaigns aimed at users in the US and across the world. Court documents unsealed today revealed that Microsoft has been waging a ...
Using a combination of old and new tactics and distribution channels, cybercriminals continue to seek to compromise endpoints and obtain online credentials. The targets haven’t changed. ...
Do you know how big your email attack surface really is? Open Source Intelligence (OSINT) is the collection of information from public sources on the Internet that both red teams and bad ...
Reuters reported that a "computer virus" infected the Spanish Defense Ministry’s intranet this month with the aim of stealing high tech military secrets, El País newspaper said on ...
A long-term phishing study involving 6 healthcare institutions shows employees are vulnerable to phishing attacks, and that they can become more vigilant through exposure.
Oh my. Bad guys have come up with a sinister new strain of blackmail/sextortion. Just when you thought things couldn't get worse, the bad guys sink lower. Eric Howes, KnowBe4's Principal ...
Microsoft’s security team is uniquely positioned to analyze trends in cyber security threats. Their frequent Security Intelligence Reports (SIR) are an excellent indicator of these ...
Scammers are shifting to SMS to carry out business email compromise (BEC) attacks, since text messaging offers less visibility to the victim and more flexibility to the attacker, says ...
A new phishing campaign targeting Instagram users is using fake copyright infringement notices to steal user credentials.
Preying on a victim’s fear of having “private” browsing details leaked sits at the center of these well-crafted attacks that leverage stolen or harvested passwords to establish ...
New research from ISACA and Terranova Security found that just 12% of security, assurance, risk and governance professionals are confident in their ability to assess the effectiveness of ...
A study recently published in the Journal of the American Medical Association highlights how vulnerable the healthcare sector is to phishing attacks, according to Jessica Davis at Health ...
A new phishing campaign is spreading malware through emails that claim to have Bitcoin investment updates, according to My Online Security. The emails direct the victim to download an ...