Avanan Blog Attack Briefs (15)


How Hackers Follow Up Successful Campaigns

When hackers find something that works, they keep going at it until it doesn't.

Read more

Hackers Find Success Spoofing Walgreens, Keep At It

Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.

Read more

Using .ppam Files to Wrap Executable Content

PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.

Read more

Walgreens Spoof Leads to Credential Harvesting

Spoofing brands is an effective way for phishers to get into the inbox and to convince end-users to click.

Read more

BECs Are Tough to Stop. Unless You Have Avanan

Have you ever gotten an email like this from your boss?

Read more

DHL Notice Delivers Malware

Every quarter, Check Point tracks the brands that were most frequently imitated by hackers.

Read more

How to Stop a BEC Attack

Business Email Compromise attacks are some of the most pernicious out there. They are an ideal combination of seemingly innocent yet incredibly difficult to stop. Th...

Read more

Hello, This is Credential Harvesting Calling

It is very simple to get voicemail notifications as an email. Any VoIP phone system can do it. It’s popular because it’s convenient and efficient. Plus, it’s been in...

Read more

Missed Delivery Messages as a Pretext for Phishing

The feeling is familiar: waiting for an important email, only to find that the message has been held up, either by a security solution or another reason.

Read more

Insecure Transfer: Hosting Phishing Links on WeTransfer

Check Point researchers have discovered a burgeoning attack taking advantage of public file sharing sites like WeTransfer to host phishing content.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial