We've been writing more and more about the ways in which hackers are utilizing Google services to launch phishing attacks. One of the ways they are doing this is by ...
We've been writing more and more about the ways in which hackers are utilizing Google services to launch phishing attacks. One of the ways they are doing this is by ...
BEC attacks are financially damaging and difficult to stop. It's why hackers continually launch these attacks. In this video, we break down one example of a BEC atta...
In an account takeover (ATO) attack, an attacker gains unauthorized access to the credentials for a user’s online account. This access can then be used for identity ...
Check Point researchers recently discovered a large-scale phishing campaign in Colombia targeting over 40 prominent companies. The attackers aimed to discreetly inst...
We've written a lot recently about how Google services are being utilized by hackers as a springboard for carrying out phishing attacks. One of those services is Goo...
We've written a lot about how scammers are using PayPal for BEC 3.0 scams. This means tat hackers are sending invoices directly from PayPal, not a spoofed site. That...
We’ve been talking about it week after week—hackers are using legitimate services for illegitimate means.
We first wrote about ZeroFont phishing a few years ago, and it remains one of our most viewed stories here. Why? Because it's an innovative technique that hackers ha...
A stunning new development in the world of Teams phishing was announced by Microsoft.
A new phishing campaign is taking off in MIcrosoft Teams.