Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.
Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.
A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.
A successful credential harvesting scam can have devastating consequences.
Check Point Research has uncovered a two-year-long campaign that is still going and making waves. The campaign starts by using spear-phishing and then sends maliciou...
Eight million businesses advertise their products on Facebook.
Spoofing brands is a common form of phishing.
Everybody loves a giveaway.
Microsoft has reported on a new man-in-the-middle phishing campaign, which targeted over 10,000 organizations in the last year.
If you get an email from your CFO requesting urgent action, what do you do?
We have written ad nauseam about something we call The Static Expressway. This refers to the idea of hackers using legitimate web pages to host or send phishing cont...