Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type of a social engineering attack, as they use psycholog...
Vishing – a portmanteau of voice and phishing – attacks are performed over the phone, and are considered a type of a social engineering attack, as they use psycholog...
A new group, Black Basta, is making head waves in the ransomware game. Since May 2022, according to Check Point Research, there have been at least 89 high-profile or...
Arctic Wolf recently published a survey of attacks from the first half of 2022 and found that there was a significant uptick in Business Email Compromise attacks.
Whenever a company holds data, there is a chance for a breach. And since companies continue to hold valuable data of all kinds, it is becoming more costly for a brea...
Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.
Global threats on are the rise. Check Point Research has noted a 28% increase in the third quarter of 2022, compared to the same period in 2021.
In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.
Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...
Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...
Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.