Security Awareness Training Blog

Phishing Blog

Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.

Phishing and Impersonated Brands

Microsoft is still the most impersonated brand for phishing campaigns, according to researchers at Vade Secure. The security firm spotted 30,621 unique Microsoft-related phishing URLs in ...
Continue Reading

New Phishing Scam Uses Fake PPP Loans to Trick Victims into Giving Up Personal Information

Taking advantage of people’s need for financial assistance, these scammers pose as a bank offering “forgivable business loans to individuals impacted by the pandemic.”
Continue Reading

Phishing for Love

Valentine’s Day-themed phishing campaigns are spiking, researchers at Check Point warn. There was a 29% increase in Valentine’s Day-related phishing domains last month, compared to a 6% ...
Continue Reading

[New E-Book] Comprehensive Anti-Phishing Guide

Spear phishing emails remain a top attack vector for the bad guys, yet most companies still don’t have an effective strategy to stop them.
Continue Reading

It’s Not Only About the URL

You have to look at the totality of an email to determine whether it is a phishing attack or not.
Continue Reading

[HEADS UP] NHS Issues Warning as UK COVID-19 Vaccine Scams Are Still Running Rampant

The National Health Service (NHS) in the UK recently sent a warning that cybercriminals are using social engineering tactics to target people wanting a COVID-19 vaccine email that is ...
Continue Reading

US Gmail Users Are Preferred Phishing Targets

Google has found that most phishing attacks (42%) target Gmail users in the US. Users in the UK were the second most targeted, with 10% of attacks. Japan came in third with 5% of phishing ...
Continue Reading

New Phishing Attack Uses Morse Code to Avoid Detection by Email Scanners

Yes – you read that right: Cybercriminals have found a way to use 1830’s technology to trick 2020s security solutions into not identifying phishing attachments as malicious.
Continue Reading

New Phishing Attack Uses Google Firebase to Trick Microsoft and Achieve a Spam Confidence Level of Just 1

This new phishing scam takes advantage of inherent trust in credible domains to get past the scrutiny of even Microsoft to trick Office 365 users into giving up their online credentials.
Continue Reading

[World Premiere] KnowBe4’s New Season 3 of Netflix-Style Security Awareness Video Series - ‘The Inside Man’

We’re excited to announce Season 3 of the award-winning KnowBe4 Original Series - ‘The Inside Man’. This network-quality video training series delivers an entertaining learning experience ...
Continue Reading

Three Tips to Stay Safe on the Road and the Information Superhighway

You surf the world wide web, you scroll through social media feeds, read articles, shop online, and respond to email through the incredible invention of the internet. We're all driving on ...
Continue Reading

SOC teams spend nearly a quarter of their day handling suspicious emails

Jeremy Fuchs at Avanan just blogged about a new report they released. It revealed some surprising results about the time SOC teams have to spend investigating suspicious emails reported ...
Continue Reading

Using Legitimate Services to Bypass Phishing Protections

Researchers at Abnormal Security have identified two techniques that attackers are using to bypass email security filters. The first tactic takes advantage of the fact that Microsoft ...
Continue Reading

[Heads Up] Email Phishing Is Now the Top Ransomware Attack Vector

New data shows that pushback from the ransomware victim “market” may be influencing just how much cybercriminals are asking for as ransom and are being paid.
Continue Reading

[HEADS UP] New Phishing Kit Spotted on Over 700 Domains

A cybercriminal gang has recently developed a new phishing kit named LogoKit on several domains. LogoKit changes logos and text in real-time in order to adapt to the targeted victims.
Continue Reading

Beware the Long Con Phish

Social engineering and phishing happen when a con artist communicates a fraudulent message pretending to be a person or organization which a potential victim might trust in order to get ...
Continue Reading

Australians Experienced over 200K Scams in 2020 Costing Over A$176 Million

New data from the Australian government’s Scamwatch site shows that phishing and vishing topped the list of scam types used to trick Australians into becoming a scam’s next victim.
Continue Reading

A UK Case Study: Recognizing COVID-19 Phishing

A phishing campaign is using convincingly spoofed offers for COVID-19 vaccination sign-ups, according to Tom Allen at Computing. As vaccines are now being distributed around the world, ...
Continue Reading

Confident About Detecting Spoofed, Scam Emails?

A survey by ESET found that most people think they’d be able to identify scam emails while shopping online. 87% of respondents said they felt secure while shopping online, while 73% ...
Continue Reading

Thousands of Stolen Credentials Accessible via Google Search as Cybercriminals Accidentally Make Them Public

A publishing goof by cybercriminals on a WordPress site made files containing stolen passwords indexable by Google and were subsequently publicly available via search.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews