Check Point Email Security Blog Attack Briefs (18)


How Impersonation Attacks Fool Users

October is National Cybersecurity Awareness Month. Each week has a theme. This week's theme? Fight the Phish. This blog shows a typical impersonation attack and how ...

Read more

Shortened LinkedIn URL Used for Phishing

When you share a link on LinkedIn, and the URL is over 26 characters, LinkedIn will automatically shorten it, as per its policy. You may have seen it while perusing ...

Read more

Bad Sender: The Importance of Sender Reputation

An easy way to determine if an email is suspicious is by looking at sender reputation. It’s no wonder, then, as we found in our 1H Cyber Attack Report, that 84.3% of...

Read more

Allow Phishing: The Problem with Allow Lists

An Allow List is a simple concept. Essentially, it's a list of addresses or domains that you've deemed safe, and thus emails from those addresses or domains shouldn'...

Read more

At The Beep: Why Voicemail Related Attacks Can Be Confusing

Oftentimes, you'll receive an email that says to call a number. It can be for anything—refunds, ask questions, etc.

Read more

Simple, Yet Effective: How BECs Catch Users Off Guard

Have you ever seen an email like this come across your inbox?

Read more

Quantum Computation: Can Phishing Gain?

A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz. Read the first article here.

Read more

New Attack Spoofs Vaccine Passes to Steal Credentials

Many countries and cities around the world are instituting a so-called COVID pass. The idea is that an app will show a person’s vaccination status or proof of negati...

Read more

No Display: New Obfuscation Tactic Emerges

Hackers have a long history of trying to obfuscate their true intent. We've written about this extensively, whether it's MetaMorph, SiteCloak, ZeroFont, baseStriker ...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial