Avanan Blog Attack Briefs (10)


How Hackers Target Nations

According to Check Point research, the second-most targeted industry in the world is the government sector. In the third quarter of this year, governments were on th...

Read more

Abusing Microsoft Customer Voice to Send Phishing Links

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.

Read more

How Black Basta Ransomware Group Starts Their Attack

A new group, Black Basta, is making head waves in the ransomware game. Since May 2022, according to Check Point Research, there have been at least 89 high-profile or...

Read more

Sending Trojans via Scanners

Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.

Read more

DHL Takes the Brand Phishing Crown

In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.

Read more

Hijacking Student Accounts to Launch BEC-Style Attacks

Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...

Read more

Video: The Google Translate Attack

Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...

Read more

Spoofing Google Translate to Steal Credentials

Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.

Read more

Continuing to Leverage Facebook Ads to Send Credential Harvesting Links

A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.

Read more

The Auto Delete Attack

A successful credential harvesting scam can have devastating consequences.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial