Please turn on your JavaScript for this page to function normally.
Office 365
Office 365 account compromise attempts on the rise

Office 365, Microsoft’s software-as-a-service productivity software suite popular with corporate users, is increasingly becoming attackers’ preferred way into …

email
Global DMARC adoption still slow, it’s open season for phishers

92 percent of U.S. Fortune 500 companies have left their customers, partners and brand names vulnerable to domain name spoofing, one of the most common digital deception …

biohazard
Attackers turn to auto-updating links instead of macros to deliver malware

SANS ISC handler Xavier Mertens has flagged and analyzed a malicious Word file that, somehow, is made to automatically download an additional malicious RTF file, ultimately …

Gmail
Google wants iOS Gmail users to think twice about following suspicious links

Google has announced the rollout of new anti-phishing checks for the iOS Gmail app: in less than two weeks, all users will be confronted with two warnings if they attempt to …

Facebook
Obscuring malicious Facebook links using the Open Graph Protocol

Most users click on links popping up in their Facebook News Feed without thinking twice about it, but it’s good to keep in mind that they can lead to malicious sites. …

Google Chrome biohazard
Another popular Chrome extension hijacked through phishing

Chris Pederick, the creator and maintainer of the Web Developer for Chrome extension, is the latest victim of attackers who hijack popular Chrome add-ons in order to push ads …

phishing
Phishers steal Chrome extension from developer

An attacker has compromised the Chrome Web Store account of German developer team a9t9 software, and has equipped their Copyfish Chrome extension with ad/spam injection …

money
Seagate to pay millions for forking over employee info to scammers

A moment of inattention by one of its employees, and Seagate stands to lose tens of millions of dollars. No, the company was not the victim of a BEC scam – instead, it …

phishing
Phishers’ techniques and behaviours, and what to do if you’ve been phished

Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva …

fight
BEC scams: How to avoid them and how to fight back

Phishing and spear-phishing emails are a constant threat to all users, but enterprises are positively inundated with them. “Most businesses will use a spam filter and …

email
Enterprises face 3,680 potential phishing emails each week

GreatHorn analyzed more than 3.5 terabytes of data – over 373 million corporate emails – to gain insights into the sheer volume of email threats facing enterprises …

phishing
Man stole bitcoin by phishing individuals on the dark web

Michael Richo, a 35-year-old from Connecticut, had the brilliant idea of stealing bitcoin from people involved in illegal deals through dark web marketplaces. Perhaps he …

Don't miss

Cybersecurity news