Account takeovers happen when an outside actor gains access to an email account. This can happen through a number of ways, from standard brute force to more complex ...
Account takeovers happen when an outside actor gains access to an email account. This can happen through a number of ways, from standard brute force to more complex ...
We've been continually writing about how hackers are utilizing Google as a springboard to launch phishing attacks. The latest version of this is through Google Colle...
Recently, Check Point Research (CPR) made an alarming discovery in Latin America - an ongoing campaign deploying a fresh variant of the BBTok banking malware. This n...
Recently, we've seen a lot of news about Quishing--or QR Code phishing. This is when the link behind a QR code is malicious, but the QR code itself is not. There was...
We've been writing more and more about the ways in which hackers are utilizing Google services to launch phishing attacks. One of the ways they are doing this is by ...
BEC attacks are financially damaging and difficult to stop. It's why hackers continually launch these attacks. In this video, we break down one example of a BEC atta...
In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...
Check Point researchers recently discovered a large-scale phishing campaign in Colombia targeting over 40 prominent companies. The attackers aimed to discreetly inst...
We've written a lot recently about how Google services are being utilized by hackers as a springboard for carrying out phishing attacks. One of those services is Goo...