Breaking Down PayPal BEC 3.0 Scams

We've written a lot about how scammers are using PayPal for BEC 3.0 scams. This means tat hackers are sending invoices directly from PayPal, not a spoofed site. That...

Read more

Phishing via Adobe

We’ve been talking about it week after week—hackers are using legitimate services for illegitimate means.

Read more

Breaking Down ZeroFont Phishing Attacks

We first wrote about ZeroFont phishing a few years ago, and it remains one of our most viewed stories here. Why? Because it's an innovative technique that hackers ha...

Read more

Storm-0324 Threat Group Switches Phishing Tactics to Teams

A stunning new development in the world of Teams phishing was announced by Microsoft.

Read more

Another Teams Attack Highlights Importance of Full-Suite Security

A new phishing campaign is taking off in MIcrosoft Teams.

Read more

VIDEO: Phishing via Google Looker Studio

Last week, we wrote about how hackers are utilizing Google Looker Studio to carry out phishing campaigns.

Read more

A Deep Dive into HTML and HTM Attachment Phishing

HTML and HTM attachments make up 50% of malicious attachments. Why are hackers resorting to this attachment form? In this video, we break it down:

Read more

New Teams Attacks: A Harbinger of Potential Issues to Come

Microsoft Teams is quickly becoming a burgeoning attack vector. We've written about a few new attacks recently. In this video, we break down one of them:

Read more

Cyber Criminals Phishing via Google Looker Studio

Today, we’re writing about cyberattacks we’re seeing via Google Looker Studio and other Google applications. Google Looker Studio is a powerful data visualization so...

Read more

BEC in Personal Email

By now, you know full well what BEC is. It's receiving a message, usually from someone pretending to be a higher-up, and asking for information. These are incredibly...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial