Whenever a company holds data, there is a chance for a breach. And since companies continue to hold valuable data of all kinds, it is becoming more costly for a brea...
Whenever a company holds data, there is a chance for a breach. And since companies continue to hold valuable data of all kinds, it is becoming more costly for a brea...
Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.
Global threats on are the rise. Check Point Research has noted a 28% increase in the third quarter of 2022, compared to the same period in 2021.
In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.
Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...
Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...
Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.
Scanning a link in the body of an email list an essential part of any security solution, though not everybody can do it. It's important because links that appear fin...
A new report from SonicWall found that ransomware is the biggest concern of most customers. A whopping 91% said it was their biggest concern. Phishing (76%) and encr...
A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.