Check Point Email Security Blog Attack Briefs (16)


Using .ppam Files to Wrap Executable Content

PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.

Read more

Walgreens Spoof Leads to Credential Harvesting

Spoofing brands is an effective way for phishers to get into the inbox and to convince end-users to click.

Read more

BECs Are Tough to Stop. Unless You Have Avanan

Have you ever gotten an email like this from your boss?

Read more

DHL Notice Delivers Malware

Every quarter, Check Point tracks the brands that were most frequently imitated by hackers.

Read more

How to Stop a BEC Attack

Business Email Compromise attacks are some of the most pernicious out there. They are an ideal combination of seemingly innocent yet incredibly difficult to stop. Th...

Read more

Hello, This is Credential Harvesting Calling

It is very simple to get voicemail notifications as an email. Any VoIP phone system can do it. It’s popular because it’s convenient and efficient. Plus, it’s been in...

Read more

Missed Delivery Messages as a Pretext for Phishing

The feeling is familiar: waiting for an important email, only to find that the message has been held up, either by a security solution or another reason.

Read more

Insecure Transfer: Hosting Phishing Links on WeTransfer

Check Point researchers have discovered a burgeoning attack taking advantage of public file sharing sites like WeTransfer to host phishing content.

Read more

Sharing Malicious Files Within Adobe Cloud

Adobe Creative Cloud is a popular suite of apps for file-sharing, creating, and more. Popular apps include Photoshop and Acrobat.

Read more

Update: SLINKIFY Attack Still in Effect

In December, Avanan researchers discovered a new phishing attack that involves sending a plain text email with malformed URLs to bypass the URL protection and rewrit...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial