PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.
PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.
Spoofing brands is an effective way for phishers to get into the inbox and to convince end-users to click.
Have you ever gotten an email like this from your boss?
Every quarter, Check Point tracks the brands that were most frequently imitated by hackers.
Business Email Compromise attacks are some of the most pernicious out there. They are an ideal combination of seemingly innocent yet incredibly difficult to stop. Th...
It is very simple to get voicemail notifications as an email. Any VoIP phone system can do it. It’s popular because it’s convenient and efficient. Plus, it’s been in...
The feeling is familiar: waiting for an important email, only to find that the message has been held up, either by a security solution or another reason.
Check Point researchers have discovered a burgeoning attack taking advantage of public file sharing sites like WeTransfer to host phishing content.
Adobe Creative Cloud is a popular suite of apps for file-sharing, creating, and more. Popular apps include Photoshop and Acrobat.
In December, Avanan researchers discovered a new phishing attack that involves sending a plain text email with malformed URLs to bypass the URL protection and rewrit...