Avanan Blog Attack Briefs


Local Meetings Under Attack

Virtual community and school board meetings have been commonplace over the last two years. Instead of gathering in person, these meetings, often held over Zoom, have...

Read more

Roblox Exploited with Trojans from Scripting Engine

Roblox is one of the most popular game systems in the world. In 2021, this gaming platform grew from 32.6 million daily active users to nearly 50 million, across 180...

Read more

The Gmail SMTP Relay Service Exploit

The “From” field in an email–or even in snail mail–is just an address line that the sender types in. Just like anyone can go to a post office and send a card that co...

Read more

Leveraging Microsoft Legitimacy to Get into the Inbox

What looks like a new, missed voice message is actually a way to send phishing pages through to the inbox. 

Read more

Financial Scams Can Be Tricky to Spot. Here's Some Tips

Financial scams come in all shapes and sizes. They can spoof major companies. They can spoof minor companies. They can be threatening. They can be confusing. 

Read more

COVID Scams Remain in Inboxes

As COVID stubbornly remains in our lives, so too do COVID-related scams.

Read more

Spoofing Credit Unions for Profit

In February, the National Credit Union Administration (NCUA) put out a statement noting that, due to the geopolitical climate, credit unions should “adopt a heighten...

Read more

It's Tax Day: Lookout for Scams

It's everyone's favorite day--Tax Day!

Read more

Using Quoted-Printable Encoding to Bypass Scanners

Phishers have a toy chest of tricks when it comes to building email campaigns. Oftentimes, what you read in the email body is represented by deceptive coding techniq...

Read more

Can You BE-C It?

Here's how you know an email is a BEC.

Read more

The Nigerian Prince Scam, with a Russian Twist

The Nigerian Price Scam is a staple of the cybersecurity world. Essentially, someone claims to be in a position of influence or notoriety and needs to get a large su...

Read more

Hackers Begin Spoofing Fintech Apps As Tax Season Approaches

With tax season around the corner, it’s a rite of passage to expect tax-related spoofs. That can come in the form of spoofing the IRS or popular tax apps like TurboT...

Read more

Analyzing the Malware Wiper

A new form of malware is reportedly being deployed by Russia against Ukraine.

Read more

Using CAPTCHA Forms to Bypass Filters

In April 2021, Avanan researchers wrote about how hackers are using CAPTCHA forms–those annoying puzzles you have to fill out after entering data to prove you are hu...

Read more

Highlighting Text in White to Fool Anti-Phishing Filters

Hackers are constantly looking for ways to disguise their intentions. They not only have to craft phishing emails that not only bypass filters but are also believabl...

Read more

Avanan Alert: Cyber Attacks Originating From Russia Increase 8x in Last 24 Hours

Starting on February 27th, Avanan has noticed an 8x increase in email-borne attacks originating from Russia.

Read more

Hackers Attach Malicious .exe Files to Teams Conversations

Microsoft Teams continues to grow in popularity. Teams counts 270 million monthly active Teams users; that's up a tidy 20 million from July 2021.

Read more

How Hackers Follow Up Successful Campaigns

When hackers find something that works, they keep going at it until it doesn't.

Read more

Hackers Find Success Spoofing Walgreens, Keep At It

Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.

Read more

Using .ppam Files to Wrap Executable Content

PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.  

Read more

1 2 3 4 5
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial