Avanan Blog Attack Briefs


The Microsoft Reply Attack

One of the most spoofed brands in phishing attacks is Microsoft. 

Read more

Have You Seen These Phishing Attacks? If So, Beware

We see phishing campaigns all the time--dedicated, long-standing attempts to hit end-users.

Read more

The Cloud Storage Re-Up Attack

Hackers always try to prey on end-users’ fear, uncertainty, and doubt. It’s all about tricking end-users into doing something they don’t want to do–namely, handing o...

Read more

How Does Ransomware Spread?

Ransomware. The word is enough to send shivers down any IT professional's spine.

Read more

Why Do Governments Get Hacked So Often?

Governments are among the most attacked industries in the world. Why?  Because they hold incredible amounts of data. That data is gold for hackers. 

Read more

BEC 3.0 - Legitimate Sites for Illegitimate Purposes 

Security services have a problem and it’s called BEC 3.0.

Read more

Beware of the Microsoft Voice Scam

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers. 

Read more

BEC 2.0 - Conversation Hijacking Exploits Accounting Teams into Payment Remittance  

One of the most financially devastating attacks is Business Email Compromise (BEC). In 2021, the FBI found that BEC-related complaints added up to $2.4 billion. For ...

Read more

Business Email Compromise Scam Leads to Credential Harvesting Evernote Page

Business Email Compromise attacks are one of the fastest-growing and most difficult-to-stop attacks in the cybersecurity space. There are a number of variants, but i...

Read more

PhishPal: How PayPal Became a Hackers’ Haven

In July of last year, we wrote about a new campaign where hackers are sending phishing emails and malicious invoices directly from PayPal. 

Read more

Using Geotargeting to Customize Phishing

In a global marketplace, the ability to geotarget is huge.

Read more

Leveraging ClickFunnels to Bypass Security Services

ClickFunnels is an online service that helps entrepreneurs and small businesses generate leads, build marketing engines and grow their businesses.

Read more

Hackers Dangling Fake Job Offers to Students

It can be tough being a student. Between the cost of tuition, room and board, and just daily life, it gets expensive very quickly. 

Read more

The Blank Image Attack

A few years ago, we wrote about the MetaMorph attack. In this attack, the malicious HTML attachments use meta refresh to redirect the end-user from an HTML attachmen...

Read more

Continuing to Use Microsoft Voice to Send Phishing Links

A few months ago, we wrote about how hackers are utilizing Microsoft’s Dynamics 365 Customer Voice platform to send phishing links. In general, the attack works by s...

Read more

Facebook Termination Notices Leads to Phishing

Last year, we wrote about a number of different Facebook-inspired attacks. See here and here for examples. 

Read more

Phishmas: USPS Off-Track

Tracking numbers are the lifeblood of holiday shipping emails. Most emails you'll get from delivery services are tracking numbers. And if you're like some people, in...

Read more

Phishmas: The Failed Delivery

There are few things more frustrating than getting a notification that a package couldn't be delivered. It requires far too much work to get it back on track. But wh...

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial