What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...
What is a Whaling Attack? A whaling attack is a specialized attack that falls under the larger category of spear phishing. Before we can define what whaling is, it’s...
The Twitter attack that saw a number of major accounts—like Joe Biden, Barack Obama, Elon Musk and other celebrities—overtaken and hacked was done via a spear phishi...
A new report confirms what has long been assumed: Microsoft Office is now the most targeted platform for hackers.
Secure Email Gateways were built for on-premises use and in that capacity they worked well. But ask yourself: when was the last time your email was on-premises? It's...
Highlights: Attackers have expanded the battleground from the inbox to the web This is the hacker’s response to click-time protection and the technique is able to by...
Highlights: After years of being frustrated with Mimecast, on everything from customer service to its inability to stop simple-seeming attacks, this benefits adminis...
Highlights: After being whalephished and inundated with attacks while using Proofpoint, this biotech firm switched to Avanan, and the attacks stopped Avanan gave a n...
We are seeing a rise in the number of phishing attacks that bypass Office 365 due to the attackers’ use of obfuscation techniques on the credential harvesting websit...
A new attack method bypasses both Microsoft 365 default security (EOP) and advanced security (ATP). At the time of writing, Microsoft 365 is still vulnerable and the...
Gartner's Latest BEC Report Suggests Business email compromise (BEC) is a simple, yet deadly attack that can have devastating financial effects on a company Traditio...