Traditional phishing emails have followed the same set-up for decades – a malicious attachment or URL embedded in the email.
Traditional phishing emails have followed the same set-up for decades – a malicious attachment or URL embedded in the email.
Security services have a problem and it’s called BEC 3.0.
Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.
We have all had the unpleasant experience of dealing with a used car salesperson. We all know the drill. They try to strongarm you with multiple different tactics th...
An individual’s inbox is a mixture of personal and professional information that many organizations feel is safe with complex passwords and security questions.
One of the most financially devastating attacks is Business Email Compromise (BEC). In 2021, the FBI found that BEC-related complaints added up to $2.4 billion. For ...
Business Email Compromise attacks are one of the fastest-growing and most difficult-to-stop attacks in the cybersecurity space. There are a number of variants, but i...
In July of last year, we wrote about a new campaign where hackers are sending phishing emails and malicious invoices directly from PayPal.
According to a new report featured in ITWire, URL-based dominance is a growing trend over phishing attachments and 4x more likely to reach users, particularly high-p...
In a global marketplace, the ability to geotarget is huge.