Researchers have uncovered a state-sponsored hacking campaign that uses Google accounts to send emails, and then uses a Google Drive or Dropbox folder as the mechani...
Researchers have uncovered a state-sponsored hacking campaign that uses Google accounts to send emails, and then uses a Google Drive or Dropbox folder as the mechani...
It’s the most wonderful time of year. Family. Post-turkey malaise. Shopping. Phishing scams.
According to Check Point research, the second-most targeted industry in the world is the government sector. In the third quarter of this year, governments were on th...
Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.
A new group, Black Basta, is making head waves in the ransomware game. Since May 2022, according to Check Point Research, there have been at least 89 high-profile or...
Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.
In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.
Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...
Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...
Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.