Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.
Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.
A new group, Black Basta, is making head waves in the ransomware game. Since May 2022, according to Check Point Research, there have been at least 89 high-profile or...
Scanners may seem like a relic of the old days–and certainly of the days of working consistently from an office.
In an award no one wants to win, DHL is now the most impersonated brand in phishing attacks.
Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...
Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...
Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.
A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.
A successful credential harvesting scam can have devastating consequences.
Check Point Research has uncovered a two-year-long campaign that is still going and making waves. The campaign starts by using spear-phishing and then sends maliciou...
Eight million businesses advertise their products on Facebook.
Spoofing brands is a common form of phishing.
Everybody loves a giveaway.
Microsoft has reported on a new man-in-the-middle phishing campaign, which targeted over 10,000 organizations in the last year.
If you get an email from your CFO requesting urgent action, what do you do?
We have written ad nauseam about something we call The Static Expressway. This refers to the idea of hackers using legitimate web pages to host or send phishing cont...
Amazon Web Services (AWS) is one of the most popular cloud storage and hosting solutions. From major companies hosting their work on the service, to individuals usin...
Hackers spoof brands all the time. They are usually popular brands, such as Microsoft or Apple.
Lucidchart is a popular site used to collaborate on drawings, charts, diagrams and more.
The hacker has two tasks: Get into the inbox. And get the user to hand over the desired information. Hackers spend tons of time thinking of creative ways to do both....