Hackers continually impersonate trusted brands to get into the inbox. By leveraging the legitimacy of a trusted domain, security solutions are more likely to view th...
Hackers continually impersonate trusted brands to get into the inbox. By leveraging the legitimacy of a trusted domain, security solutions are more likely to view th...
In November, we wrote about an attack that spoofed Amazon. The attack worked by using legitimate Amazon links, forcing the end-user to make a phone call instead to c...
Financial scams are the name of the game. After all, hackers are after your money first and foremost.
As security professionals, you never want end-users to click on a phishing link. But following the path of what would've happened if they did can be instructive.
When attackers are crafting malicious messages, they have two opposing goals.
Virtual community and school board meetings have been commonplace over the last two years. Instead of gathering in person, these meetings, often held over Zoom, have...
Roblox is one of the most popular game systems in the world. In 2021, this gaming platform grew from 32.6 million daily active users to nearly 50 million, across 180...
The “From” field in an email–or even in snail mail–is just an address line that the sender types in. Just like anyone can go to a post office and send a card that co...
What looks like a new, missed voice message is actually a way to send phishing pages through to the inbox.
Financial scams come in all shapes and sizes. They can spoof major companies. They can spoof minor companies. They can be threatening. They can be confusing.