Check Point Email Security Blog Attack Briefs (18)


Do You Have a Minute? How a Simple Question Can Lead to Major Damage

Business Email Compromise attacks have exploded in popularity. Gartner has found that BECs increased by nearly 100% in 2019 and through 2023, they predict that BEC a...

Read more

The OneFont Attack: Manipulation and Obfuscation

In 2018, Avanan researchers discovered the ZeroFont phishing technique, whereby hackers insert hidden words, all with a font size of zero, that is invisible to the r...

Read more

New Attack Spoofs Amazon to Obtain Payment From End-User

As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...

Read more

Send Info. Hope for Money. Get Phished Instead.

Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.

Read more

The BCC Attack

A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.

Read more

WHO Are You? Hackers Spoof World Health Organization

As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...

Read more

As Vaccine Mandates Spread, So Too Do Vaccine Scams

As long as COVID-19 vaccines have been readily available, there have been scammers looking to profit from it. According to Check Point Research, the following have b...

Read more

How Impersonation Attacks Fool Users

October is National Cybersecurity Awareness Month. Each week has a theme. This week's theme? Fight the Phish. This blog shows a typical impersonation attack and how ...

Read more

Shortened LinkedIn URL Used for Phishing

When you share a link on LinkedIn, and the URL is over 26 characters, LinkedIn will automatically shorten it, as per its policy. You may have seen it while perusing ...

Read more

Bad Sender: The Importance of Sender Reputation

An easy way to determine if an email is suspicious is by looking at sender reputation. It’s no wonder, then, as we found in our 1H Cyber Attack Report, that 84.3% of...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial