Phishing April 12, 2021 Graeme Messina JavaScript obfuscator: Overview and technical overview JavaScript cyberattacks are on the rise, meaning you need to be extra careful when opening your emails.
Phishing April 1, 2021 Pedro Tavares Malicious Excel attachments bypass security controls using .NET library A recent threat group called Epic Manchego is using a new technique to create Excel files to bypass antivirus (AV) and and get low detection rates. By exploring...
PhishingHighlighted March 12, 2021 Andrei Antipov Top nine phishing simulators [updated 2021] Looking for a free or paid phishing simulator? Here are tools that allow you to actually run a phishing campaign on your own.
Phishing February 22, 2021 Howard Poston Phishing with Google Forms, Firebase and Docs: Detection and prevention The COVID-19 pandemic spurred a massive shift toward telework as companies tried to both stay operational and safe. One of the biggest impacts of this shift...
Phishing December 29, 2020 Kurt Ellzey Phishing domain lawsuits and the Computer Fraud and Abuse Act The worlds of trademark law and marketing seem to be constantly at odds with each other, occasionally collapsing into a court of law where they battle for...
Phishing December 18, 2020 Greg Belding Phishing: Reputational damages When phishing and damages are thought of in the same sentence, the typical thoughts of many are the loss of data due to theft, identity theft and ultimately...
Phishing December 15, 2020 Rodika Tollefson Spearphishing meets vishing: New multi-step attack targets corporate VPNs Cybercriminals come out of the woodwork to take advantage of major events. Anything from the Olympics to the US elections is an opportunity to launch phishing...
Phishing November 17, 2020 Susan Morrow Phishing attack timeline: 21 hours from target to detection Phishing seems to be ever-present in the modern cyber-threat landscape. During the COVID-19 pandemic, there has even been an increase in phishing attacks...
Phishing November 2, 2020 Greg Belding Overview of phishing techniques: Brand impersonation Phishing emails are well known for using different flavors of trickery to cause users to bite on the proverbial lure. Perhaps the phishing technique that...
Phishing November 2, 2020 Rodika Tollefson BEC attacks: A business risk your insurance company is unlikely to cover Business email compromise (BEC) attacks can cost an organization millions of dollars, and the threat is growing as more business activity takes place online....