Check Point Email Security Blog Attack Briefs (20)


Insecure Services: Spoofing Secure Email Notifications

With the increased attention to email security in every organization, users are getting used to receiving documents sent to them over "secure" services. With sensiti...

Read more

Lack of Trust: Pretending to be a Trusted Sender to Steal Credentials

Avanan researchers have discovered an attack that takes over the account of a trusted customer to send phishing emails.

Read more

Hackers Using Microsoft Against Itself

Attackers are using automated methods to generate attack email addresses that end in the onmicrosoft.com domain to try and bypass any email filters that may have onm...

Read more

Return to the Office. Get Welcomed by Phishing Emails

Returning to the office? Many workers around the country and the world are. Hackers are noticing.

Read more

Whole New Ballgame: GameStop's URL Leveraged for Phishing Attacks

On May 17th, Avanan researchers noticed a spike in phishing emails containing links to a particular subdomain of GameStop.com. GameStop is an American gaming company...

Read more

GroupThink: Targeting Group Emails to Bypass Scanners

Over the last three days, we have seen over 800 phishing emails sent to 11 different clients that try and leverage language that is normally used by physical or onli...

Read more

Help Is Not On the Way: Phishing Masquerading as COVID Relief

SEGs that rely on allow or blocklists are playing an ever-increasing catchup game when it comes to catching phishing emails. This phishing campaign shows us the resu...

Read more

Dat's Bad Attack: Hackers Using .dat Files to Bypass SEGs

A .dat file is a generic file that is used in various applications. What's unique about them is that they can only be used by the application that created them. For ...

Read more

The Synonym Attack: Using Similar Words to Get By Scanners

Because of the rise of invoice related phishing emails, many security vendors have resorted to treating emails with the word “invoice” in the subject/body/attachment...

Read more

Dropping In: Attackers Leverage Dropbox to Get to Inboxes

Attackers are sharing files with suspicious names to users through Dropbox. Because Dropbox is a reputable service, most email security vendors will allow these file...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial