Kate Spade Suicide Phishing Templates
This is another celebrity death which will spawn a raft of phishing and social media attacks. We recommend to inoculate your users before they make it through the filters.
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
This is another celebrity death which will spawn a raft of phishing and social media attacks. We recommend to inoculate your users before they make it through the filters.
The 2018 FIFA World Cup has drawn a worldwide audience. It's also attracted phishing scams using event tickets as bait. Tickets for the matches can only be purchased legitimately through ...
Phishing attacks carried out via text messages that use the “Punycode” technique to make nefarious URLs look legitimate are becoming more popular, cloud security firm Zscaler says.
The leader of the Cobalt hacking group was arrested in Spain two months ago, but the gang resurfaced at the end of May. Their spear phishing emails started hitting victims' in-boxes again ...
Duo Security is a provider of secure login/access tools, and they just released their yearly Trusted Access Report with some very interesting data. Here Is The Summary Stats gathered from ...
Because it is "GDPR day" our templates team has been hard at work developing GDPR/Privacy policy templates. We have 6 new templates available in the system, located in Current Events. We ...
The statistic that four percent of employees will click on almost anything, with “Free Coffee” and “Package Delivery” taking some of the top spots among phishbait subject lines, may not ...
Roaming Mantis has drawn notoriety as a banking Trojan. Its criminal controllers, however, have recently given it some new functionality: phishing and cryptomining. The criminals have ...
Social engineering follows seasonal patterns. It's also connected to major events. We see this every year with holiday-themed phishing attacks between Thanksgiving and New Year's Day.
A good article in Forbes that takes another dive into the new 2018 Verizon Data Breach Investigations Report.
Phishers have found a way of moving the malicious URLs in their emails past Office 365's protections. The security company Avanan says they've observed criminals using a tag in the HTML ...
Bleepingcomputer reported: "Ransomware has infected the servers of the Riverside Fire and Police department for the second time in a month. The first ransomware infection took place on ...
Gmail's new confidential mode lets its users create "expiration dates" for emails, or require recipients to provide an SMS passcode. (And Google also claims they've removed the option to ...
Rosie Murray West at the Financial Times reported: "Taxpayers are being targeted by a new wave of phishing scams linked to the financial calendar, HM Revenue & Customs has warned. ...
The word "phishing" can't be found in Chaucer or Shakespeare. It is a homophone of "fishing". But why "ph" instead of "f"? Many English words of Greek origin transliterate "φ" (phi) as ...
OK, here is something really scary. KnowBe4's Chief Hacking Officer Kevin Mitnick now and then calls me with some chilling news. This time, Kuba Gretzky, a white hat hacker friend of ...
Attackers know that companies are sending a lot of emails to customers about GDPR—and that makes them prime opportunity for phishing attacks. With the looming GDPR May 25 deadline almost ...
This is the second year we've published quarterly results of the most-clicked phishing email subjects across a few categories. We separate the data into subjects related to social media ...
Catalin Cimpanu at Bleepingcomputer reported: "Chinese cyber spies are evolving their tactics, focusing on IT staffers, relying more and more on spear phishing instead of malware, and ...
The most common infection vectors are still email phishing and drive-by downloads according to the latest threat report from AI security specialist Cylance. The report provides a ...