October is National Cybersecurity Awareness Month. Each week has a theme. This week's theme? Fight the Phish. This blog shows a typical impersonation attack and how ...
October is National Cybersecurity Awareness Month. Each week has a theme. This week's theme? Fight the Phish. This blog shows a typical impersonation attack and how ...
When you share a link on LinkedIn, and the URL is over 26 characters, LinkedIn will automatically shorten it, as per its policy. You may have seen it while perusing ...
An easy way to determine if an email is suspicious is by looking at sender reputation. It’s no wonder, then, as we found in our 1H Cyber Attack Report, that 84.3% of...
An Allow List is a simple concept. Essentially, it's a list of addresses or domains that you've deemed safe, and thus emails from those addresses or domains shouldn'...
Oftentimes, you'll receive an email that says to call a number. It can be for anything—refunds, ask questions, etc.
Have you ever seen an email like this come across your inbox?
A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz. Read the first article here.
Ordering online is easy.
Many countries and cities around the world are instituting a so-called COVID pass. The idea is that an app will show a person’s vaccination status or proof of negati...
Hackers have a long history of trying to obfuscate their true intent. We've written about this extensively, whether it's MetaMorph, SiteCloak, ZeroFont, baseStriker ...