Scammers continually utilize and spoof file-sharing services to launch attacks. We've seen this recently with the We Shouldn't Transfer Attack, the Flipping Out Atta...
Scammers continually utilize and spoof file-sharing services to launch attacks. We've seen this recently with the We Shouldn't Transfer Attack, the Flipping Out Atta...
We all dream of the day that the lotto card finally breaks our way and we can make our way to financial glory.
Many email security vendors are now heavily relying on sender domain reputation as an indicator of phishing. Avanan's research has found that 43.35% of all phishing ...
A email comes that says it has remittance advice.
Payment confirmations are essential in business. You need to know a payment has been processed.
An interestingly-worded campaign has bypassed ATP scanners and made it into inboxes.
Direct deposit is a great convenience for businesses and individuals.
Traditional SEGs scan emails through filters that check URLs in emails against various static lists to determine how to treat each URL. Based on the decisions made b...
PDFs are not always what they seem. They are good vectors to launch attacks, because PDFs are usually important, meaning end-users are likely to click. One estimate ...
A static HTML file isn't always what it seems.