Common spear-phishing tricks
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
Spam Analysis Expert
46 articles
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
Phishers are using Google online services to take over Microsoft online service accounts.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Scammers are cashing in on the PlayStation 5 shortage. Here’s how to avoid their bait.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.